Common Information
Type Value
Value
AAD - Enumerate Users
Category Guidelines
Type Cloud-Security
Misp Type Cluster
Description AAD - Enumerate Users
Details Published Attributes CTI Title
Details Website 2024-11-17 1 The Road to CRTP Cert — Part 2
Details Website 2024-11-15 7 Attacktive Directory — TryHackMe Walkthrough
Details Website 2024-11-04 6 Cyber Briefing: 2024.11.04
Details Website 2024-11-04 3 How to configure OneDrive Redirection using Microsoft Endpoint
Details Website 2024-11-01 2 Microsoft warns Azure Virtual Desktop users of black screen issues
Details Website 2024-10-31 5 Maestro
Details Website 2024-10-31 12 Maestro
Details Website 2024-10-31 12 Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network | Microsoft Security Blog
Details Website 2024-10-22 16 Sentinel for Purple Teaming
Details Website 2024-10-22 0 Cloud Security : Key Steps for Penetration Testing and Hardening
Details Website 2024-10-21 3 SMB ENUMERATION
Details Website 2024-10-18 4 Cybersecurity News Review — Week 42
Details Website 2024-10-17 4 Mastering Cloud Threat Detection: Tracking On-Prem to Cloud Movement via Credential Access with…
Details Website 2024-10-15 11 Active Cyber Defence - Taking back control | JUMPSEC LABS
Details Website 2024-10-14 8 Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration - RedPacket Security
Details Website 2024-10-14 8 Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
Details Website 2024-10-14 9 Nation-state actor exploited three Ivanti CSA zero-days
Details Website 2024-10-10 15 Monteverde HTB Writeup as OSCP preparation
Details Website 2024-10-03 7 AS-REP Roasting in Active Directory
Details Website 2024-10-03 8 Kicking it Old-School with Time-Based Enumeration in Azure
Details Website 2024-10-02 0 A Deep Dive into Active Directory
Details Website 2024-09-26 52 Storm-0501: Ransomware attacks expanding to hybrid cloud environments
Details Website 2024-09-26 50 Storm-0501: Ransomware attacks expanding to hybrid cloud environments | Microsoft Security Blog
Details Website 2024-09-26 1 Securing Serverless Applications in Azure: Best Practices
Details Website 2024-09-26 1 Exploiting SMTP on Metasploitable 2: Unveiling the Power of Port 25