Blog

  • DejaBlue? Not again!

    Microsoft published seven new Windows vulnerabilities sourcing, again, in the Remote Desktop Protocol (RDP). Like the name hints, DejaBlue, similarly to BlueKeep has the potential to create a worm that my

    Read More
  • Understanding Capital One Breach

    Major security breached to Capital One database resulted in 140,000 Social Security numbers, 80,000 bank account numbers and compromised one million Canadian Social Insurance numbers. Breach’s costs are expected to be

    Read More
  • The Policy Expert: MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)

    Configuring this value in the most secure fashion can help to lower the risk for DOS attacks via packet spoofing. The objective of this kind of attack is to flood the

    Read More
  • detecting DDoS attack

    Distributed Denial of Service (DDoS) attacks are already ‘permanent residents’ in the cybersecurity statistics, but as time goes by their complexity, sophistication, and duration increases. Here are some interesting statistics on

    Read More
  • Clarifying APRA CPS 234

    The Australian Prudential Regulation Authority (APRA) is responsible for regulations in Australia’s financial bodies such as banks, insurance, and superannuation companies. As a result of the emerging amount of information on

    Read More
  • Sodinokibi ransomware- MSPs and client’s point of view

    Hackers breached MSPs and used Webroot console to infect PCs with Sodinokibi ransomware.   The infrastructure of at least three MSPs has been breached, in order to access and deploy ransomware

    Read More
  • The Policy Expert- RDS: Do not allow clipboard redirection

      POLICY DESCRIPTION: Specifies whether to prevent the sharing of clipboard contents (clipboard redirection) between a remote computer and a client computer during a Remote Desktop Services session. You can use this

    Read More
  • RDP clipboard vulnerability

    Major vulnerabilities were discovered in the commonly used Remote Desktop Protocol. Although believed to be a relatively save protocol, Check Point researchers revealed a total of 25 RDP vulnerabilities, with 16

    Read More
  • Don’t let your RDP be the next breach’s smoking gun

    Wormable RDP vulnerability gave the wrongly assumed safe RDP protocol a reality check. However, the truth emerged only a few months ago when Check Point discovered a major vulnerability in the

    Read More
  • Ryuk attack- protect your organization

    Ryuk ransomware was first detected in August 2018. One of its famous attacks happened on 2018 Christmas, attacking several big newspapers including The Wall Street Journal and The New York Times,

    Read More
  • The Policy Expert: Configuring Maximum Security Log Size

    Maximum log size should be set to any kind of event logs, as part of your security policy. This configuration’s value is highly important for detecting attacks and investigating their source.

    Read More
  • How to best spend your cybersecurity budget- research based model

    This research aims to show a possible model for a decision making approach for cybersecurity investment in Small and Medium Enterprises (SMEs). The scope of cyber attacks on organizations is endless,

    Read More