Microsoft’s guidance to help mitigate Kerberoasting  

Credit to Author: David Weston| Date: Fri, 11 Oct 2024 17:00:00 +0000

Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. Microsoft is sharing recommended actions administrators can take now to help prevent successful Kerberoasting cyberattacks.

The post Microsoft’s guidance to help mitigate Kerberoasting   appeared first on Microsoft Security Blog.

Read more

Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 08 Aug 2024 18:00:00 +0000

Microsoft researchers found multiple vulnerabilities in OpenVPN that could lead to an attack chain allowing remote code execution and local privilege escalation. This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise, and unauthorized access to sensitive information.

The post Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE appeared first on Microsoft Security Blog.

Read more