Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we’re able to overwrite it, and what kind of threat it exposes.Read more
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee’s profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.Read more
Azure Active Directory simplifies IT infrastructure management by providing a single place to store information about digital identities. But this convenient Identity and Access Management (IAM) system comes pre-configured with only basic features and security settings. For example, the default setting for Azure storage accounts allows access from anywhere, including the internet.
There is no better feeling than finally giving session on a real stage, instead of virtually! We all have trully missed face-to-face interacting with people. Our CEO, Paula Januszkiewicz have had this opportunity during this year’s edition of GISEC Global Conference 2021 – Thank you!Read more
Privacy and security are always top of mind for IT, but never more so than at this moment when the reality continues to impact how organizations operate today. Remote workforce is becoming a common practice.Read more