NEW

The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

Kirsten Gantenbein

Principal Technical Writer

About Kirsten

Kirsten is a technical writer and content wonk at ExtraHop. If she's not around the office, you might find her rowing on Lake Union, watching soccer, or visiting one of the many splendid craft breweries around the Pacific Northwest.

Posts by this author

What are Kerberos Golden Ticket Attacks and How to Detect Them

August 31, 2021

Kerberos authentication protocol can be exploited in golden ticket attacks. Learn how adversaries pull off these attacks and how to detect and prevent them.

What is ICMP Tunneling and How to Protect Against It

May 27, 2021

Learn from ExtraHop how ICMP tunneling attacks work and what you can do to protect against them. Examples included.

What is DCSync and How to Protect Against It

March 30, 2021

DCSync is an attack technique used to get user credentials. ExtraHop explains how it works and how to protect against DCSync.

How Ransomware Works and How to Prevent It

November 13, 2020

Ransomware can cause irreparable damage. Learn how it works and how to detect it to stop attacks.

What Is PsExec and How to Protect Against Lateral Movement

November 5, 2020

PsExec is a Windows Sysinternals utility that enables IT administrators to run commands and executable binary files on remote servers, but it can also be used for stealthy lateral movement.

What is DNS Tunneling and How to Protect Against It

October 19, 2020

Learn how DNS tunneling attacks work and what you can do to protect against them. Examples included!

SQL Injection Attacks: What Are They and How to Detect Them (with Examples!)

October 13, 2020

Learn how SQL injection attacks work and what you can do to protect against them. Examples included!

Get to Know the Metric Explorer

May 31, 2017

Learn more about one of our platform's most powerful tools and start uncovering hidden infrastructure issues in a matter of clicks.

Experience RevealX NDR for Yourself

Schedule a demo