blog category
BloodHound

BloodHound
Establish security boundaries in your on-prem AD and Azure environment
Preventing escalation from initial access in your Active Directory (AD) environment to Domain Admins can feel...
Jun 20, 2022 • 21 min read
Read Post
BloodHound
Managed Identity Attack Paths, Part 3: Function Apps
Intro and Prior Work In this three part blog series we have explored attack paths that emerge...
Jun 8, 2022 • 9 min read
Read Post
BloodHound
Managed Identity Attack Paths, Part 2: Logic Apps
Intro and Prior Work In this three part blog series we are exploring attack paths that emerge...
Jun 7, 2022 • 9 min read
Read Post
BloodHound
Managed Identity Attack Paths, Part 1: Automation Accounts
Intro and Prior Work In this three part blog series we will explore attack paths that emerge...
Jun 6, 2022 • 12 min read
Read Post
BloodHound
Announcing Azure in BloodHound Enterprise
In July of 2021, we launched BloodHound Enterprise. Since then, our customers have been using BHE...
Mar 17, 2022 • 3 min read
Read PostBloodHound
Introducing BloodHound 4.1 — The Three Headed Hound
Introducing BloodHound 4.1 — The Three Headed Hound Prior Work Analyzing Active Directory attack paths using graph theory is...
Feb 9, 2022 • 6 min read
Read PostBloodHound
3 Foundational Pillars for Attack Path Management: Pillar 2 — Empirical Impact Assessment
3 Foundational Pillars for Attack Path Management: Pillar 2 — Empirical Impact Assessment Attack Paths are the chains...
Jan 27, 2022 • 7 min read
Read Post
BloodHound
3 Foundational Pillars for Attack Path Management: Pillar 1 — Continuous & Comprehensive Mapping
3 Foundational Pillars for Attack Path Management: Pillar 1 — Continuous & Comprehensive Mapping When we coined the...
Dec 9, 2021 • 5 min read
Read Post
BloodHound
Active Directory Attack Paths — “Is everyone this bad?”
Active Directory Attack Paths — “Is it always this bad?” We launched BloodHound Enterprise to help organizations manage Attack...