PREEMPT LITE: Our free, easy and continuous AD analytics solution. It's self-serve!

LEARN MORE & DOWNLOAD NOW

Preempt Blog

The latest on keeping your enterprise protected from insider threats and breaches

NTLM Reflection Attack? Not for Preempt Customers

NTLM strikes again! Microsoft released a patch this week, CVE-2019-1384, which addresses a bypass vulnerability that allows attackers to successfully...
Read Now

Webcast: Achieving Conditional Access That Protects Every Account In Your Hybrid Environment

Organizations adopting cloud services face challenges of visibility and control that can lead to unauthorized access, and therefore widen the...
Read Now

How User Interface Design Drives Better Threat Detection

The most well-known data breach in our industry occurred in December 2013, when more than 40 million credit card numbers...
Read Now

Security Advisory: Active Directory Open to More NTLM Attacks

By: Yaron Zinar and Marina Simakov Drop The MIC 2 (CVE 2019-1166) & Exploiting LMv2 Clients (CVE-2019-1338) Today, on October 2019 Patch Tuesday,...
Read Now

Security Weekly – Hack Naked News Podcast – Featuring Preempt Customer Testimonial

Today’s retailers are continually faced with security challenges impacting both employees and customers. That's why behavioral monitoring is one of...
Read Now
1 2 3 31

Popular Posts

Product

What’s New in 3.1? New Dashboard,…

Preempt is happy to release version 3.1, available today! Included in the release are a brand new security assessment dashboard, exciting features offering more visibility…

Read More

Product

Reducing Investigation Time: How to Quickly…

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential…

Read More

Product

Solving Log Storage: How You Can…

Logs. At best: They’re a vital part of your information security strategy to “find the bad.” At worst: They’re a nightmare to manage — especially…

Read More

Developer

Optimize Your Okta Deployment with Preempt

Enabling customers to secure their corporate assets while easily moving to the cloud has always been at the forefront of Preempt’s mission. While Preempt shines…

Read More

Developer

Ping + Preempt: Securing All Access…

Enterprises struggle to understand what is truly going on in their organization: what their users are doing and how to stop the risky activity. Add…

Read More

Events

CEO Interview: Today’s Threat Landscape Demands…

Today, too many organizations are approaching complex cybersecurity challenges by attempting to hire their way out of the problem while building disjointed and ineffective security…

Read More

Events

M&A cyber diligence, talent shortages, and…

Enterprises are often forced to implement multiple moving parts as the traditional network perimeter is no longer sufficient to protect against modern threats. These disjointed…

Read More

Events

Podcast: Addressing Credential Compromise and Insider…

How can you secure an organization by using identity, behavior, and risk? Preempt CEO Ajit Sancheti recently conducted an interview with Blog Talk Radio on…

Read More

Research

Security Advisory: Targeting AD FS With…

On July 2019 Patch Tuesday, Microsoft released a patch for CVE-2019-1126, an important vulnerability discovered by Preempt Research Labs. The vulnerability discovered leads to security…

Read More

Research

How to Easily Bypass EPA to…

As announced in our recent security advisory, Preempt researchers discovered how to bypass the Enhanced Protection for Authentication (EPA) mechanism to successfully launch NTLM relay…

Read More

Research

Drop the MIC – CVE-2019-1040

As announced in our recent security advisory, Preempt researchers discovered how to bypass the MIC (Message Integrity Code) protection on NTLM authentication and modify any…

Read More

Research

Your Session Key is My Session…

As announced in our recent security advisory, Preempt researchers discovered a critical vulnerability which allows attackers to retrieve the session key for any NTLM authentication…

Read More

Research

Security Advisory: Critical Vulnerabilities in NTLM…

On June 2019 Patch Tuesday, Microsoft released patches for CVE-2019-1040 and CVE-2019-1019, two vulnerabilities discovered by Preempt researchers. The critical vulnerabilities consist of three logical…

Read More

Research

New Microsoft Exchange Vulnerability Exposes Domain…

Last week, the CERT Coordination Center (CERT/CC) issued a vulnerability note warning versions of Microsoft Exchange 2013 and newer are vulnerable to an NTLM relay…

Read More