by Tibor Luter | Sep 1, 2021 | ICS/OT Security
If you think about “supply chain attack” and “HVAC,” you will probably immediately think of the headline-making Target breach of 2013. But that wasn’t the only breach via a third-party HVAC vendor. Just this month, several hospitals in Boston may have narrowly...
by Tibor Luter | Aug 26, 2021 | Compliance
Is Your Current Cybersecurity Strategy Right for a New Hybrid Workforce? The global pandemic forced many employees to work from home, and remote working is likely to become a firmly established part of the working routine for employers and employees when it ends. A...
by Tibor Luter | Aug 23, 2021 | Offsec
Almost 2,000 Exchange servers hacked using ProxyShell exploit Almost 2,000 Microsoft Exchange email servers have been hacked over the past two days and infected with backdoors after owners did not install patches for a collection of vulnerabilities known...
by Tibor Luter | Aug 9, 2021 | Fusion Center
Building a Huntbook to Discover Persistent Threats from Scheduled Windows Tasks In this blog post, the first in a series introducing the Kestrel Threat Hunting Language, we will show you how to get started with your first hunt. You’ll learn how to set up your...
by Tibor Luter | Aug 5, 2021 | Cloud Security
The discovery stage of your cloud migration project Migration or digital transformation to the Cloud is at the forefront of every organisation’s plans- It’s no longer a case of if that transformation is happening it’s how Some organisations are not sure where to start...
Recent Comments