Blog

  • RDP clipboard vulnerability

    Major vulnerabilities were discovered in the commonly used Remote Desktop Protocol. Although believed to be a relatively save protocol, Check Point researchers revealed a total of 25 RDP vulnerabilities, with 16

    Read More
  • Don’t let your RDP be the next breach’s smoking gun

    Wormable RDP vulnerability gave the wrongly assumed safe RDP protocol a reality check. However, the truth emerged only a few months ago when Check Point discovered a major vulnerability in the

    Read More
  • Ryuk attack- protect your organization

    Ryuk ransomware was first detected in August 2018. One of its famous attacks happened on 2018 Christmas, attacking several big newspapers including The Wall Street Journal and The New York Times,

    Read More
  • The Policy Expert: Configuring Maximum Security Log Size

    Maximum log size should be set to any kind of event logs, as part of your security policy. This configuration’s value is highly important for detecting attacks and investigating their source.

    Read More
  • How to best spend your cybersecurity budget- research based model

    This research aims to show a possible model for a decision making approach for cybersecurity investment in Small and Medium Enterprises (SMEs). The scope of cyber attacks on organizations is endless,

    Read More
  • Docker host REST API vulnerability

    Docker containers are becoming more and more popular in organizations IT environments because they allow virtualization at the operating system level. Currently, the most common OS for Docker hosting is Linux

    Read More
  • RunC vulnerability from a host’s hardening point of view

    In February 2019, a vulnerability was found in runC container runtime. CVE-2019-5736 affects Docker’s containers that run on default settings and can lead the attacker to gain root level access on

    Read More
  • Leaving TLS 1.2 and moving to TLS 1.3

    New version of TLS was launched in 2018 – the TLS 1.3 protocol. TLS 1.3 aims to solve all of the problems facing its older version – TLS 1.2. What is

    Read More
  • 8 Hardening Actions That Will Break Your IIS Server

    Security versus functionality is always a concern when approaching server hardening. Hardening your IIS server is one of the most crucial missions when trying to achieve a secured infrastructure. There are

    Read More
  • Hardening TLS/SSL protocols- What Might Break

      Is your organization still using old SSL/TLS protocols? June 2018 was the deadline for hardening SSL/TLS protocols and implementing a more secure encryption protocol. The PCI Security Standards Council requires

    Read More
  • Hardening Configurations using CIS Benchmarks

    The center for internet security (CIS) instructs to perform 20 different actions in order to achieve a cyber-attack resilient IT infrastructure. Among those 20 Controls, the first five found to be

    Read More
  • Why the hell WannaCry is still here?!

      According to December 2018 Top 10 Malware report, WannaCry malware holds the dubious lead of malware breakdowns with 28%. WannaCry total damage is estimated by 4 billion $ But as WannaCry might

    Read More