Header image

Network Gaps Allow Attackers to Gain Admin Access

Access could allow an external attacker to gain full control of the network.

Around half of environments, which have been tested, actually allow attack paths that lead to domain administrator access. 

According to research from Picus Security, 40 percent of businesses have gaps in their infrastructure that could allow an attacker to gain the highest level of access within their organization’s IT network. 

Once they have these privileges they can manage user accounts or modify security settings, or gain full control of the network; allowing attackers to conduct data exfiltration, deploy malware, or disrupt business operations. 

Read more about these findings, based on a worldwide comprehensive analysis of more than 136 million cyber attacks simulated by the Picus Security Validation Platform in the 2024 Picus Security Blue Report.


Download the Picus Blue Report 2024 here. 

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

24
Oct
Webinar

Securing Data in the Cloud: Advanced Strategies for Cloud Application Security

Discussing the current trends in cloud security, focusing on the challenges of hybrid environments

In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.

image image