blog category

BloodHound

image for Establish security boundaries in your on-prem AD and Azure environment

BloodHound

Establish security boundaries in your on-prem AD and Azure environment

Preventing escalation from initial access in your Active Directory (AD) environment to Domain Admins can feel...

Jun 20, 2022 • 21 min read
Read Post
image for Managed Identity Attack Paths, Part 3: Function Apps

BloodHound

Managed Identity Attack Paths, Part 3: Function Apps

Intro and Prior Work In this three part blog series we have explored attack paths that emerge...

Jun 8, 2022 • 9 min read
Read Post
image for Managed Identity Attack Paths, Part 2: Logic Apps

BloodHound

Managed Identity Attack Paths, Part 2: Logic Apps

Intro and Prior Work In this three part blog series we are exploring attack paths that emerge...

Jun 7, 2022 • 9 min read
Read Post
image for Managed Identity Attack Paths, Part 1: Automation Accounts

BloodHound

Managed Identity Attack Paths, Part 1: Automation Accounts

Intro and Prior Work In this three part blog series we will explore attack paths that emerge...

Jun 6, 2022 • 12 min read
Read Post
image for Announcing Azure in BloodHound Enterprise

BloodHound

Announcing Azure in BloodHound Enterprise

In July of 2021, we launched BloodHound Enterprise. Since then, our customers have been using BHE...

Mar 17, 2022 • 3 min read
Read Post
image for Introducing BloodHound 4.1 — The Three Headed Hound

BloodHound

Introducing BloodHound 4.1 — The Three Headed Hound

Introducing BloodHound 4.1 — The Three Headed Hound Prior Work Analyzing Active Directory attack paths using graph theory is...

Feb 9, 2022 • 6 min read
Read Post
image for 3 Foundational Pillars for Attack Path Management: Pillar  2 — Empirical Impact Assessment

BloodHound

3 Foundational Pillars for Attack Path Management: Pillar 2 — Empirical Impact Assessment

3 Foundational Pillars for Attack Path Management: Pillar 2 — Empirical Impact Assessment Attack Paths are the chains...

Jan 27, 2022 • 7 min read
Read Post
image for 3 Foundational Pillars for Attack Path Management: Pillar 1 — Continuous & Comprehensive Mapping

BloodHound

3 Foundational Pillars for Attack Path Management: Pillar 1 — Continuous & Comprehensive Mapping

3 Foundational Pillars for Attack Path Management: Pillar 1 — Continuous & Comprehensive Mapping When we coined the...

Dec 9, 2021 • 5 min read
Read Post
image for Active Directory Attack Paths — “Is everyone this bad?”

BloodHound

Active Directory Attack Paths — “Is everyone this bad?”

Active Directory Attack Paths — “Is it always this bad?” We launched BloodHound Enterprise to help organizations manage Attack...

Nov 17, 2021 • 4 min read
Read Post