Author Posts: Yaron Zinar

Real-time vs After the Fact: Pitfalls of Log-based Behavioral Threat Detection

It was recently published that Shadow Brokers, the group behind the Equation Group leak, are selling a new set of...

Kerberos, NTLM and SAM: 3 Ways Attackers Can Crack Passwords

In a previous blog, we discussed the prevalence of weak passwords in the Enterprise. The fact of the matter is,...

Do Smart Cards Protect You From Credential Theft?

In recent years, the use of smart cards widely increased as a secure form of authentication for a wide range...