News and Research

ad in a circle

Active Directory password hardening: How it’s done   

Weak passwords are a problem waiting to happen – Verizon estimates that 80% of hacking-related breaches come from weak or stolen passwords. They’re the most common way for people to access their accounts and applications, making them an obvious... Read More

hacker behind desktop screen

MFA prompt bombing: How it works and how to stop it

User credentials are golden prizes for attackers. Weak or breached credentials provide an easy target for attackers looking to log in to a network instead of breaking in. Most businesses have caught on to the fact that multi-factor authentication... Read More

specops software logo

May The Force stay far far away from your AD #StarWarsDay

It’s back and better than ever! We’re celebrating #StarWarsDay with an updated list of the most used Star Wars themed passwords that top the Specops Breached Password Protection list. The Specops Breached Password Protection database includes the HaveIBeenPwned list,... Read More

thumbs up icon

Cyber insurance requirements for Active Directory

If you’ve noticed that your organization’s cyber insurance premiums have increased over the last year, you’re not alone. With evolving cyber threats, the rise in ransomware attacks, and the ubiquity of hybrid and remote workforces, insurers are responding by... Read More

specops software logo

Stale user accounts report in Active Directory

Stale (inactive) user accounts in Active Directory can provide attackers (and former employees) with an easy path into a corporate network. Even if the stale user account is not a privileged account, it can be used for privilege escalation... Read More