Microsoft’s recent research spotlights a dangerous post-exploitation technique called Golden dMSA. This new attack method abuses SYSTEM-level access on domain controllers to execute persistent payloads, including ransomware that targets the core of Active Directory. By hijacking delegated Managed Service Accounts (dMSAs), attackers can gain access without needing to compromise traditional credentials. Originally introduced in Windows […]| Silverfort
As both a Qantas Frequent Flyer and a cybersecurity professional based in Sydney, I felt the impact of the airline’s June 2025 breach personally. The breach was a result of attackers accessing a third-party customer service platform operated by an overseas call centre and exposed personal data of approximately 5.7 million customers, myself included. While […]| Silverfort
Microsoft has disclosed that threat actors are actively exploiting SharePoint vulnerabilities. Learn 5 ways to protect your environment.| Silverfort
Learn how to apply the Zero Trust framework to securing non-human identities (NHIs).| Silverfort
In recent weeks, several major UK retail brands, including M&S, Harrods, and the Co-operative Group, have recently suffered significant cyberattacks disrupting business operations.| Silverfort
At first glance, Identity Threat Detection and Response (ITDR) and Identity Security Posture Management (ISPM) sound like two names for the same thing (because one thing we really need in…| Silverfort
In light of the Midnight Blizzard’s attack, cybersecurity strategies must evolve to keep pace with the sophisticated tactics employed by nation-state actors.| Silverfort