Hackers don’t break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike. […]

from https://www.bleepingcomputer.com/news/security/7-steps-to-take-after-a-credential-based-cyberattack/