Is Ransomware a real threat to ICS environments?
Introduction ICS environments are the control systems found in various industries such as manufacturing, oil, and gas, electric power generation, etc. Additionally, ICS security is concerned with...
Vulnerability Analysis : CVE-2021-26857
Introduction This vulnerability exists in the Microsoft Exchange server attack chain, and this vulnerability is also known as the SSRF vulnerability. Hackers can use this vulnerability to...
Indirect Losses Resulting from a Cyberattack
The losses caused by network attacks directly or indirectly affect enterprises. In this article, we focus on indirect losses caused by a cyberattack. These indirect losses are often hard to quantify...
CVE-2021-1675 (Windows Print Spooler)
Introduction Windows printer spooler is a basic service, which by default runs on Microsoft Windows environments, including client machines, servers and active directories. The vulnerability is that...
3 Things you must know about Industrial Cyber threats
Cyber threats are everywhere, and no industrial organization or enterprise is safe. Today's organizations need to know a few things to protect themselves better. This article will discuss what you...
CVE-2021-42013 Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.50
Introduction: Among the open-source HTTP servers of the Apache Foundation, "Apache HTTP Server" is a very popular one. A directory traversal vulnerability exists in version 2.4.49 of "Apache HTTP...
How much should you be spending on cyber security?
As cyber-attacks evolve, it is critical for businesses to invest smartly in cyber security. Read this article to know about Cyber security budgeting and its Importance.
Vulnerability Analysis: Log4j (CVE-2021-44228)
Introduction: On December 10, 2021 details of the Apache Open-Source Project Log4j Remote Code Execution Vulnerability CVE-2021-44228 were made public. It was called Log4Shell (CVE-2021-44228) and...
The benefits of proactive cybersecurity
The evolving cybersecurity environment is making it harder to run a business. Traditional network security tends to be passive, that is, to respond after an attack occurs. A passive strategy means...
Guidelines for industrial organizations to improve cybersecurity during procurement
Like other strategic functions in an organization, the purchasing department is constantly evolving and innovating. In the digital age, transition to online procurement process has made businesses...