Search Results for: domain Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find... Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started... Blog Post Persistent Linux Security Problem Enables DNS Cache Poisoning December 29, 2021 DNS cache poisoning vulnerability initially uncovered in 2008 still lives on, with the potential to cripple the internet as we... Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post 50 Domains Operated by North Korean Hackers Are Taken Down January 7, 2020 On December 30th, Microsoft announced that 50 web domains operated by a hacking group fund by the North Korean government... Blog Post CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to... Blog Post PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... Blog Post Scams and Fake Domains Attack May Ruin Your Black Friday and Cyber Monday November 28, 2019 As Black Friday and Cyber Monday attract a lot of shoppers, cybercriminals use more sophisticated measures such as scams and... Blog Post What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,... Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations... Knowledge Center Mitigating Credential Dumping on Windows Clients July 9, 2021 Credential dumping from compromised Windows clients allows the attacker to perform lateral movement and gain control even after more sensitive hosts... Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...
Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find...
Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started...
Blog Post Persistent Linux Security Problem Enables DNS Cache Poisoning December 29, 2021 DNS cache poisoning vulnerability initially uncovered in 2008 still lives on, with the potential to cripple the internet as we...
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post 50 Domains Operated by North Korean Hackers Are Taken Down January 7, 2020 On December 30th, Microsoft announced that 50 web domains operated by a hacking group fund by the North Korean government...
Blog Post CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to...
Blog Post PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows...
Blog Post Scams and Fake Domains Attack May Ruin Your Black Friday and Cyber Monday November 28, 2019 As Black Friday and Cyber Monday attract a lot of shoppers, cybercriminals use more sophisticated measures such as scams and...
Blog Post What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...
Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations...
Knowledge Center Mitigating Credential Dumping on Windows Clients July 9, 2021 Credential dumping from compromised Windows clients allows the attacker to perform lateral movement and gain control even after more sensitive hosts...
Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...