Have You Looked in the Trash? Unearthing Privilege Escalations from the Active Directory Recycle Bin
How overlooked objects in AD's Recycle Bin can become a goldmine for attackers—and what defenders need to know

How overlooked objects in AD's Recycle Bin can become a goldmine for attackers—and what defenders need to know
Strategies to minimize logging generation, and methods to enhance logging efficiency
Review of the current security level brought by BitLocker against data theft
Implementing S/MIME with Exchange Online and OWA for secure email communications
Discover how to exploit the certifried vulnerability easily with bloodyAD.
Take full control of the Kerberos protocol on Active Directory using bloodyAD.
Leverage certificate-based authentication power on Active Directory environment.