Calcom Blog

New Posts

NTLMv1 or NTLMv2? Does it even matter?

Young handsome man wearing glasses over isolated background Smiling showing both hands open palms, presenting and advertising comparison and balance

NTLM is Microsoft’s old mythological authentication protocol. Although new and better authentication protocol has already been developed, NTLM is still very much in use. in fact, even the most recent Windows

Read Post

Mitigating relay NTLM remote code execution vulnerability

microsoft_ntlm

The Preempt research team found two critical vulnerabilities in Microsoft, sourced in three logical flaws in NTLM, Microsoft’s authentication protocol. The vulnerabilities potential outcome is allowing remote execution of malicious code

Read Post

The policy expert- RDS: Do not allow supported Plug and Play device redirection

Policeman emoji isolated on white background, cop emoticon 3d rendering

POLICY DESCRIPTION: This policy setting allows you to control the redirection of supported Plug and Play devices, such as Windows Portable Devices, to the remote computer in a Remote Desktop Services

Read Post

DejaBlue? Not again!

Shot of a young businessman experiencing stress during late night at work

Microsoft published seven new Windows vulnerabilities sourcing, again, in the Remote Desktop Protocol (RDP). Like the name hints, DejaBlue, similarly to BlueKeep has the potential to create a worm that my

Read Post

Understanding Capital One Breach

hacker stealing credit cards datas , money and password from laptop in office

Major security breached to Capital One database resulted in 140,000 Social Security numbers, 80,000 bank account numbers and compromised one million Canadian Social Insurance numbers. Breach’s costs are expected to be

Read Post

The Policy Expert: MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)

Policeman emoji isolated on white background, cop emoticon 3d rendering

Configuring this value in the most secure fashion can help to lower the risk for DOS attacks via packet spoofing. The objective of this kind of attack is to flood the

Read Post

detecting DDoS attack

3D concept

Distributed Denial of Service (DDoS) attacks are already ‘permanent residents’ in the cybersecurity statistics, but as time goes by their complexity, sophistication, and duration increases. Here are some interesting statistics on

Read Post

Clarifying APRA CPS 234

Australia with network representing major air traffic routes. Elements of this image furnished by NASA.

The Australian Prudential Regulation Authority (APRA) is responsible for regulations in Australia’s financial bodies such as banks, insurance, and superannuation companies. As a result of the emerging amount of information on

Read Post

Sodinokibi ransomware- MSPs and client’s point of view

Close-up Of A Human Hand Attracting Red Human Figures With Horseshoe Magnet On White Background

Hackers breached MSPs and used Webroot console to infect PCs with Sodinokibi ransomware.   The infrastructure of at least three MSPs has been breached, in order to access and deploy ransomware

Read Post

The Policy Expert- RDS: Do not allow clipboard redirection

Policeman emoji isolated on white background, cop emoticon 3d rendering

  POLICY DESCRIPTION: Specifies whether to prevent the sharing of clipboard contents (clipboard redirection) between a remote computer and a client computer during a Remote Desktop Services session. You can use this

Read Post