The new open source tools are designed to help defense, identity and access management, and security operations center teams discover vulnerable network shares. Network shares in Active Directory environments configured with excessive permissions pose serious risks to the enterprise in the form of data exposure, privilege escalation, and ransomware attacks. Two new open source adversary simulation tools PowerHuntShares […]