Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Defend Against Pass-the-Ticket Attacks: Stop PC Hacking Techniques in Active Directory

Discover how cybercriminals exploit the Pass-the-Ticket attack to breach critical systems—and learn how to defend against it! In this cybersecurity tutorial, Jon Obst, Director of R&D at Netwrix Corporation, demonstrates this advanced Active Directory hacking technique. See how attackers use PC hacking techniques to steal user tickets without passwords, enabling lateral movement, privilege escalation, and data theft.

Fortifying Financial Services Cybersecurity with Threat Intelligence and Cybersecurity Automation

The World Economic Forum’s Global Cybersecurity Outlook 2025 Insight Report paints a bleak picture of what the year ahead holds for technology security teams worldwide. However, some industries are likely to be worse off than others.

How AI is Transforming Cyber Attacks

Since its introduction into cybersecurity in the late 1980s as a tool for detecting unusual activity, artificial intelligence (AI) has grown in popularity and functionality, with a major surge of adoption happening in the past few years, thanks to its growing ability to perform tasks faster and more accurately than humans. However, AI has never operated in isolation; it has always relied on human input. And any advanced technology that requires human input can be used for both good and bad.

Just-In-Time (JIT) Access Management: The Essential Guide

Standing privileges are a ticking time bomb in your cloud environment—and the threat might be closer than you think. Every user with continuous access represents a potential vulnerability, and the financial, reputational, and legal reputations can be severe. Stolen credentials were among the top three reasons hackers gain access to organizations’ systems.

Warning: Ransomware Threats Increased Fourfold in 2024

Researchers at Barracuda observed a fourfold increase in ransomware threats last year, driven by increasingly sophisticated ransomware-as-a-service (RaaS) operations. “The developers behind RaaS platforms often have the time, resources, and skills to invest heavily in advanced and evasive toolsets and templates,” Barracuda explains.

Software Will Become Agentic and the Security Lessons We Need To Learn

Ever since OpenAI publicly released ChatGPT in late 2022, people have been predicting the end of programmers. Supposedly, AI can do anything programmers can do. While I’m not convinced all programmers are going away, I wouldn’t want to be a brand new programmer, and I do think the field is definitely going to change, if not significantly shrink over time. I’m not going out on much of a limb in saying this as almost everyone thinks this. Microsoft CEO Satya Nadella thinks this.

Invoice or Impersonation? 36.5% Spike in Phishing Attacks Leveraging QuickBooks' Legitimate Domain in 2025

A KnowBe4 Threat Lab Publication Authors: Martin Kraemer, James Dyer, and Lucy Gee Much like sending a phishing email from a compromised account, cybercriminals can boost the deliverability and credibility of their attacks by leveraging legitimate platforms. Notably, there has been a growing proportion sent using the popular accounting software Intuit QuickBooks. Our Threat Research team has observed a 36.5% increase in the use of this platform since January 1, 2025.