blog category

BloodHound

image for Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

BloodHound

Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

TL;DR: Refreshed user interface with a new vertical navigation layout for improved user experience. General Availability...

Feb 11, 2025 • 6 min read
Read Post
image for Insurance companies can reduce risk with Attack Path Management

BloodHound

Insurance companies can reduce risk with Attack Path Management

TL;DR Insurance companies host large amounts of sensitive data (PII, PHI, etc.) and often have complex...

Jan 23, 2025 • 4 min read
Read Post
image for Introducing BloodHound CLI

BloodHound

Introducing BloodHound CLI

We created a new tool to help you install and manage BloodHound instances, BloodHound CLI! GitHub...

Jan 17, 2025 • 3 min read
Read Post
image for Unwrapping BloodHound v6.3 with Impact Analysis

BloodHound

Unwrapping BloodHound v6.3 with Impact Analysis

Just in time for the holidays, sharper tools for faster defense Today, the SpecterOps team rolled out...

Dec 12, 2024 • 6 min read
Read Post
image for FedRAMP High Authorization for BloodHound Enterprise is a Critical Win for the Public Sector

BloodHound

FedRAMP High Authorization for BloodHound Enterprise is a Critical Win for the Public Sector

Author: David McGuire, CEO, SpecterOps  Today, we’re thrilled to announce that SpecterOps has earned FedRAMP High...

Dec 5, 2024 • 3 min read
Read Post
image for BOFHound: AD CS Integration

BloodHound

BOFHound: AD CS Integration

TL;DR: BOFHound can now parse Active Directory Certificate Services (AD CS) objects, manually queried from LDAP,...

Oct 30, 2024 • 14 min read
Read Post
image for Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

BloodHound

Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs

In conversation: Pete McKernan & Luke Luckett As organizations seek to wrap their arms around potential cybersecurity...

Oct 2, 2024 • 6 min read
Read Post
image for ADCS Attack Paths in BloodHound — Part 3

BloodHound

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated...

Sep 11, 2024 • 22 min read
Read Post
image for BloodHound Operator — Dog Whispering Reloaded

BloodHound

BloodHound Operator — Dog Whispering Reloaded

BloodHound Operator — Dog Whispering Reloaded It’s summer 2024 and we are back! Actually, we are SO back,...

Aug 6, 2024 • 20 min read
Read Post