How to defend against Active Directory attacks that leave no trace
Cybercriminals are using new tactics and techniques to gain access to Active Directory in novel ways, making their attacks even more dangerous—and more necessary to detect. This article will explore a few types of attacks have been seen in the wild that leave no discernable trail or, at least, any evidence of malicious activity, explains Guido Grillenmeier, Chief Technologist, Semperis.