Blog

Cybersecurity Awareness Month

It’s October bringing fall weather, pumpkin spiced lattes and a month dedicated to cybersecurity awareness.

Exploiting Kaseya Unitrends Backup Appliance – Part 1

Multiple vulnerabilities were discovered in the Unitrends Backup appliance and client software. An attacker with network access to the management interface or backup ports on the client or server could be exploited to compromise the machine. Both suffer from critical remote code execution vulnerabilities.

Understanding Zero Trust: Beyond a Buzzword

The concept of Zero Trust has evolved from an industry catchphrase to an essential security framework. At its core, Zero Trust operates on the principle of “never trust, always verify,” eliminating the notion that threats only exist outside your network perimeter. For businesses navigating today’s complex threat landscape, implementing Zero Trust means verifying every user, […]

The Human Element: Why Security Awareness Training Still Matters

Despite advanced technical defenses, social engineering remains among the most effective attack vectors. Our incident response team has observed a 40% increase in sophisticated phishing campaigns targeting specific employees with access to sensitive systems.

Ransomware Recovery: Planning for the Unthinkable

The question is no longer if your organization will face a ransomware threat, but when. While prevention remains critical, equally important is your ability to recover quickly and completely when prevention measures fail.

How To Reverse Engineer the SolarWinds Hack

When it comes to security incidents involving malware, most of us rely on the information provided by the investigating firm to understand what the malware does, why it does it, and how to find it in our own environment. However, if you are interested in more in-depth details like us, you also want to know […]