Calcom Blog

New Posts

detecting DDoS attack

3D concept

Distributed Denial of Service (DDoS) attacks are already ‘permanent residents’ in the cybersecurity statistics, but as time goes by their complexity, sophistication, and duration increases. Here are some interesting statistics on

Read Post

Clarifying APRA CPS 234

Australia with network representing major air traffic routes. Elements of this image furnished by NASA.

The Australian Prudential Regulation Authority (APRA) is responsible for regulations in Australia’s financial bodies such as banks, insurance, and superannuation companies. As a result of the emerging amount of information on

Read Post

MSP attacks- MSPs and client’s point of view

Close-up Of A Human Hand Attracting Red Human Figures With Horseshoe Magnet On White Background

Hackers breached MSPs and used Webroot console to infect PCs with Sodinokibi ransomware.   The infrastructure of at least three MSPs has been breached, in order to access and deploy ransomware

Read Post

The Policy Expert- RDS: Do not allow clipboard redirection

Policeman emoji isolated on white background, cop emoticon 3d rendering

  POLICY DESCRIPTION: Specifies whether to prevent the sharing of clipboard contents (clipboard redirection) between a remote computer and a client computer during a Remote Desktop Services session. You can use this

Read Post

RDP clipboard vulnerability

3D Character depressed next to a clipboard with  red X mark. Isolated on white.

Major vulnerabilities were discovered in the commonly used Remote Desktop Protocol. Although believed to be a relatively save protocol, Check Point researchers revealed a total of 25 RDP vulnerabilities, with 16

Read Post

Don’t let your RDP be the next breach’s smoking gun

Smoke - Physical Structure, Smoking - Activity, Fumes, Cigarette, Fire - Natural Phenomenon

Wormable RDP vulnerability gave the wrongly assumed safe RDP protocol a reality check. However, the truth emerged only a few months ago when Check Point discovered a major vulnerability in the

Read Post

Ryuk attack- protect your organization

[url=file_closeup.php?id=25180837][img]file_thumbview_approve.php?size=1&id=25180837[/img][/url] [url=file_closeup.php?id=25180823][img]file_thumbview_approve.php?size=1&id=25180823[/img][/url] [url=file_closeup.php?id=25180767][img]file_thumbview_approve.php?size=1&id=25180767[/img][/url] [url=file_closeup.php?id=25180749][img]file_thumbview_approve.php?size=1&id=25180749[/img][/url] [url=file_closeup.php?id=25180735][img]file_thumbview_approve.php?size=1&id=25180735[/img][/url] [url=file_closeup.php?id=25180712][img]file_thumbview_approve.php?size=1&id=25180712[/img][/url] [url=file_closeup.php?id=25180670][img]file_thumbview_approve.php?size=1&id=25180670[/img][/url] [url=file_closeup.php?id=25180651][img]file_thumbview_approve.php?size=1&id=25180651[/img][/url] [url=file_closeup.php?id=25180636][img]file_thumbview_approve.php?size=1&id=25180636[/img][/url] [url=file_closeup.php?id=25180611][img]file_thumbview_approve.php?size=1&id=25180611[/img][/url] [url=file_closeup.php?id=25180598][img]file_thumbview_approve.php?size=1&id=25180598[/img][/url] [url=file_closeup.php?id=25180573][img]file_thumbview_approve.php?size=1&id=25180573[/img][/url] [url=file_closeup.php?id=25180563][img]file_thumbview_approve.php?size=1&id=25180563[/img][/url] [url=file_closeup.php?id=25180548][img]file_thumbview_approve.php?size=1&id=25180548[/img][/url] [url=file_closeup.php?id=25180527][img]file_thumbview_approve.php?size=1&id=25180527[/img][/url] [url=file_closeup.php?id=25180515][img]file_thumbview_approve.php?size=1&id=25180515[/img][/url] [url=file_closeup.php?id=25180492][img]file_thumbview_approve.php?size=1&id=25180492[/img][/url] [url=file_closeup.php?id=25180484][img]file_thumbview_approve.php?size=1&id=25180484[/img][/url] [url=file_closeup.php?id=18949514][img]file_thumbview_approve.php?size=1&id=18949514[/img][/url] [url=file_closeup.php?id=18949465][img]file_thumbview_approve.php?size=1&id=18949465[/img][/url]

Ryuk ransomware was first detected in August 2018. One of its famous attacks happened on 2018 Christmas, attacking several big newspapers including The Wall Street Journal and The New York Times,

Read Post

The Policy Expert: Configuring Maximum Security Log Size

Policeman emoji isolated on white background, cop emoticon 3d rendering

Maximum log size should be set to any kind of event logs, as part of your security policy. This configuration’s value is highly important for detecting attacks and investigating their source.

Read Post

How to best spend your cybersecurity budget- research based model

Midsection of businessman squeezing piggybank with tape measure on wooden table

This research aims to show a possible model for a decision making approach for cybersecurity investment in Small and Medium Enterprises (SMEs). The scope of cyber attacks on organizations is endless,

Read Post

Docker host REST API vulnerability

docker host rest api

Docker containers are becoming more and more popular in organizations IT environments because they allow virtualization at the operating system level. Currently, the most common OS for Docker hosting is Linux

Read Post