blog category

BloodHound

image for Introducing the BloodHound Query Library

BloodHound

Introducing the BloodHound Query Library

TL;DR The BloodHound Query Library is a community-driven collection of Cypher queries designed to help BloodHound...

By: Martin Sohn Christensen, Joey Dreijer
Jun 17, 2025 • 6 min read
Read Post
image for Making Least Privilege Real: Previewing Privilege Zones in BloodHound Enterprise

BloodHound

Making Least Privilege Real: Previewing Privilege Zones in BloodHound Enterprise

TL;DR Most organizations assume they’ve implemented least privilege, but assumptions don’t stop attackers. Privilege Zones in...

By: Justin Kohler
Jun 16, 2025 • 8 min read
Read Post
image for Chatting with Your Attack Paths: An MCP for BloodHound

BloodHound

Chatting with Your Attack Paths: An MCP for BloodHound

TL;DR In an effort to learn about Model Context Protocol servers, I created a MCP server...

By: Matthew Nickerson
Jun 4, 2025 • 22 min read
Read Post
image for (Why) IAM demands an #AttackGraph First Approach

BloodHound

(Why) IAM demands an #AttackGraph First Approach

TL;DR: Don’t start with access lists, start with attacker movement. Your new baseline: “Be the best...

By: Kay Daskalakis
May 27, 2025 • 23 min read
Read Post
image for The Renaissance of NTLM Relay Attacks: Everything You Need to Know

BloodHound

The Renaissance of NTLM Relay Attacks: Everything You Need to Know

NTLM relay attacks have been around for a long time. While many security practitioners think NTLM...

By: elad shamir
Apr 8, 2025 • 40 min read
Read Post
image for Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

BloodHound

Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

TL;DR: Refreshed user interface with a new vertical navigation layout for improved user experience. General Availability...

By: dev bhatt
Feb 11, 2025 • 6 min read
Read Post
image for Insurance companies can reduce risk with Attack Path Management

BloodHound

Insurance companies can reduce risk with Attack Path Management

TL;DR Insurance companies host large amounts of sensitive data (PII, PHI, etc.) and often have complex...

By: kirsten gibson
Jan 23, 2025 • 4 min read
Read Post
image for Introducing BloodHound CLI

BloodHound

Introducing BloodHound CLI

We created a new tool to help you install and manage BloodHound instances, BloodHound CLI! GitHub...

By: Christopher Maddalena
Jan 17, 2025 • 3 min read
Read Post
image for Intune Attack Paths — Part 1

BloodHound

Intune Attack Paths — Part 1

Intune Attack Paths — Part 1 Prior Work Several people have recently produced high-quality work around Intune tradecraft. I...

By: Andy Robbins
Jan 15, 2025 • 21 min read
Read Post