Solution Brief: Pass-The-Hash

December 17, 2019

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Instead of requiring plaintext passwords, Pass-the-Hash attacks allow the attacker to authenticate with password hashes.

Previous Article
Protecting Corporate Social Media Accounts With Native And Secure Access
Protecting Corporate Social Media Accounts With Native And Secure Access

Ensure secure, isolated and monitored access and session management for major social media applications wit...

Next Article
Global Communication Solutions Provider Deploys CyberArk Privileged Access Manager to Mitigate the Threat of Pass-the-Hash Attacks
Global Communication Solutions Provider Deploys CyberArk Privileged Access Manager to Mitigate the Threat of Pass-the-Hash Attacks

Leading communications provider enhances PAM with CyberArk.