Technology grows, evolves, and changes over time, but most organizations often need to support legacy systems. In the Microsoft world, this typically means keeping legacy authentication protocols like NTLM authentication around despite their known shortcomings. The new PetitPotam attack exploits some of these legacy protocols to take over Windows domains.
Join Kilian and Kyle Roth from the Varonis Incident Response team as they discuss the background of the PetitPotam attack, how attackers and ransomware operators are weaponizing it, and tips to help defend against it.
Articles referenced in this episode:
👉To learn how else we can help, please visit us at: https://www.varonis.com/help/
We've been keeping the world's most valuable data out of enemy hands since 2005 with our market-leading data security platform.How it works
Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cyber security and technology best practices.