logo
April 14, 2023 | Kevin Joyce

What Is Zerologon and How Do You Mitigate It?

Commonly referred to as Zerologon, CVE-2020-1472 is the Common Vulnerabilities and Exposures (CVE) identifier assigned to a vulnerability in Microsoft's Netlogon Remote Protocol (MS-NRPC). MS-NRPC is essential for authentication of both user and machine accounts in Active Directory. The...
December 16, 2022 | Joe Dibley

How NTFS Alternate Data Streams Introduce Security Vulnerability

You may not be familiar with NTFS file streams, but you use them every day when you access files on any modern Windows system. This blog post explains this feature of NTFS ADS, shows how hackers can exploit file stream functionality in cyberattacks, and offers strategies for defending your...
May 12, 2016 | Alex Vovk

How to Escape Data Tampering Nightmare

Earlier this year Admiral Michael Rogers, head of the NSA and the US Cyber Command, talked about the key 'three things that keep him awake at night' The first two are the fear of online attacks against US critical infrastructure and non-state terrorist groups changing how they use online...
March 11, 2016 | Michael Fimin

Top Five Hottest Trends at RSA 2016 Conference

The 25th 2016 RSA Conference, held in San Francisco, CA, has brought together the record number of attendees from all over the world to discuss major IT industry trends and upcoming challenges. For the past years, RSA Conference has been raising different hot topics, from unstructured data...
February 8, 2016 | Michael Fimin

5 Keynotes from the ENISA Guide on Vulnerability Disclosure

Over the last few years, there has been a rise in the number of vulnerabilities that have been publicly announced. According to a “Good Practice Guide on Vulnerability Disclosure” by European Union Agency for Network and Information Security (ENISA), published in December 2015, the volume of...
October 16, 2014 | John O'Neill Sr.

Shellshock Demands a Managed Response

Shellshock is the latest and possibly most significant IT security vulnerability identified by researchers. I imagine that by now most IT pros have heard of this threat. In a year of unprecedented security events, some may be “tuning out” security. If ever there was an IT vulnerability to not...
September 19, 2014 | Richard Muniz

Patching Is Mitigation You Do on Daily Basis

Recently, Disaster Recovery was a topic of several blog posts.  So far we’ve identified the four pieces, and they are: • Mitigation: lessening or eliminating the impact of an event • Planning: putting together a document that will act as a script to help you get back up and...
...