[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fKZe1kAczAkE-ULGWsqq9zAhpE-T9VCz6ndIWyw-H2Yw":3},{"article":4,"iocs":43},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":23,"category":24,"article_tags":27},"b8bcc1d8-4258-4b4a-a601-5a390d1008af","Active Directory Certificate Services is a high impact vector for privilege escalation. Adversari...","active-directory-certificate-services-is-a-high-impact-vector-for-privilege-esca-bad964","Active Directory Certificate Services is a high impact vector for privilege escalation. Adversaries misuse built-in features to impersonate accounts and establish persistence. Our research provides a deep dive into these methods. Read our analysis: https:\u002F\u002Ft.co\u002F24jLSrMp7j https:\u002F\u002Ft.co\u002FNzyl228g8k","Security researchers have published an analysis demonstrating how adversaries exploit Active Directory Certificate Services (AD CS) to escalate privileges, impersonate accounts, and establish persistence in compromised environments. The research provides a deep dive into the attack methods leveraging built-in AD CS features to achieve post-exploitation objectives.","Research reveals Active Directory Certificate Services as high-impact privilege escalation vector for adversaries.",null,"https:\u002F\u002Fx.com\u002FUnit42_Intel\u002Fstatus\u002F2055064891975692327","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHIUOnLsWgAAEkqN.jpg","2026-05-14T23:17:06+00:00","2026-05-15T00:00:11.220427+00:00",8,[18,21],{"name":19,"type":20},"Active Directory Certificate Services","technology",{"name":22,"type":20},"Active Directory","2c8f44d4-b56e-47cf-9677-04f22c9ee78d",{"id":23,"icon":11,"name":25,"slug":26},"Identity & Access","identity-access",[28,33,38],{"category":29},{"id":30,"icon":11,"name":31,"slug":32},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":34},{"id":35,"icon":11,"name":36,"slug":37},"c5eccf7c-abbc-4bd3-bbed-e6da5cba8e73","Incident Response","incident-response",{"category":39},{"id":40,"icon":11,"name":41,"slug":42},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]