Critical vulnerability in Linux and Mac

Critical vulnerability in Linux and Mac

A critical vulnerability has been discovered in libssh – the implementation library for Secure Shell (SSH) that could allow anyone connect to computers remotely without knowing your password. Please, install the latest patches for your systems and pay...
Top 3 research and rating platforms for cybersecurity

Top 3 research and rating platforms for cybersecurity

The first step our potential customers take is visiting of the websites with independent ratings, reviews, and feedbacks online to check the quality, excellence, and professionalism of a vendor or service provider they are about to engage with. It is very important...
The best penetration test for your business

The best penetration test for your business

If you have decided that penetration test (an authorized simulated attack on a computer system, performed to evaluate the security of the system) is what your business needs, next step will be to choose its type.We will guide you through this process to find out which...
Windows 10 Start menu

Windows 10 Start menu

About AppLocker Creating AppLocker rules Summary Introduction Recently our security team discovered several issues with Windows 10 (Enterprise and Education versions) in Active Directory domain. We will try to describe how it all started, below. We needed to...
UnderDefense’s engineer unlocked Splunk certifications

UnderDefense’s engineer unlocked Splunk certifications

We are pleased to be a Spunk partner and now our security analysts are awarded and holding Splunk certifications. Slunk Inc. is a company producing software for searching, monitoring, and analyzing machine-generated big data, via a Web-style interface. We...