blog category
BloodHound

BloodHound
Closing the Gaps: How Attack Path Management Improves Vulnerability Management Programs
In conversation: Pete McKernan & Luke Luckett As organizations seek to wrap their arms around potential cybersecurity...
Oct 2, 2024 • 6 min read
Read Post
BloodHound
ADCS Attack Paths in BloodHound — Part 3
ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated...
Sep 11, 2024 • 22 min read
Read Post

BloodHound
BloodHound Operator — Dog Whispering Reloaded
BloodHound Operator — Dog Whispering Reloaded It’s summer 2024 and we are back! Actually, we are SO back,...
Aug 6, 2024 • 20 min read
Read PostBloodHound
Hybrid Attack Paths, New Views and your favorite dog learns an old trick
Introducing Hybrid Attack Paths Death from Above: An Attack Path from Azure to Active Directory With BloodHound...
Aug 2, 2024 • 6 min read
Read Post
BloodHound
Mapping Snowflake’s Access Landscape
Attack Path Management Because Every Snowflake (Graph) is Unique Introduction On June 2nd, 2024, Snowflake released a...
Jun 13, 2024 • 28 min read
Read Post
BloodHound
ADCS Attack Paths in BloodHound — Part 2
ADCS Attack Paths in BloodHound — Part 2 In Part 1 of this series, we explained how we incorporated...
May 1, 2024 • 13 min read
Read Post
BloodHound
Final Steps to BloodHound Enterprise for Government — FedRAMP High Compliance
Final Steps to BloodHound Federal — FedRAMP High Compliance Ever since SpecterOps first launched BloodHound Enterprise (BHE) in...
Mar 5, 2024 • 3 min read
Read Post
BloodHound
The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate...