From 59ef635f7dd278e73e1c7320effaa8d189a0938c Mon Sep 17 00:00:00 2001 From: "Johnny B. Goode (not my real name)" <102751043+blueteamer@users.noreply.github.com> Date: Thu, 14 Mar 2024 16:31:42 +0100 Subject: [PATCH] make sense --- .../articles/2024-03-know-your-enemy-midnight-blizzard/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/articles/2024-03-know-your-enemy-midnight-blizzard/index.md b/content/articles/2024-03-know-your-enemy-midnight-blizzard/index.md index e1c03da..2edd5fc 100644 --- a/content/articles/2024-03-know-your-enemy-midnight-blizzard/index.md +++ b/content/articles/2024-03-know-your-enemy-midnight-blizzard/index.md @@ -71,7 +71,7 @@ To mitigate the risk posed by Midnight Blizzard and safeguard against their mali - Patch Management: Regularly update software and services to address known vulnerabilities and reduce the likelihood of exploitation by threat actors. - Network Segmentation: Segment networks to limit the lateral movement of threat actors within the network, thereby containing potential breaches and minimizing the impact of their activities. - Monitoring and Detection: Deploy advanced threat detection systems capable of identifying and responding to suspicious activities indicative of Midnight Blizzard's TTPs. -- Conditional Access Policies: Restrict access to company resources by using tailored policies. +- Conditional Access Policies: Restrict access to company resources by using onboarded company devices only. ## Sources