UnderDefense Blog

News from UnderDefense in NYC

News from UnderDefense in NYC

News from UnderDefense in NYCWe’ve moved! UnderDefense is excited to announce that you can find us at 111 John Street, Suite 420 in NYC. Also, there are a few brilliant events in August-October that we are going to take part and encourage you to do the same.28 August...

UD experts are not only in the cyber world

UD experts are not only in the cyber world

UD experts are not only in the cyber worldOur UnderDefense team had some truly great time this weekend! We regularly spend time together to build great communication between our teams and nurture company values.This time our little going-out-of-city became an...

UnderDefense in Canada

UnderDefense in Canada

UnderDefense in Canada UnderDefense had great opportunities to attend many insightful events and meet interesting people in Canada. UD representatives were happy to visit two separate events but equally important. They got in touch with world leaders at an...

Women in Technology at UnderDefense

Women in Technology at UnderDefense

Women in Technology at UnderDefenseUnderDefense supports Women in Technology! We have a whole bunch of talented and brilliant female Security Specialists and proud of this beautiful part of our team! We are absolutely proud that 9 out of 36 UD-teamers (around 25%) are...

New Feature in AWS: Traffic Mirroring

New Feature in AWS: Traffic Mirroring

Why petroleum companies get shut down|Oil & Gas security New edition of UnderDefense Vlog with the main topic Oil and Gas security! In this video you’ll find tips for Petroleum companies on how to prevent cyber risks, discover threats that can make business blow,...

Security guru from Facebook, Juniper & Google: Nick Bilogorskiy

Security guru from Facebook, Juniper & Google: Nick Bilogorskiy

New Feature in AWS: Traffic MirroringNow security analysts are able to collect data fast and flexibly with a new feature. Traffic Mirroring in AWS has given an ability to transfer the traffic to a SIEM (like Splunk) and analyse it. This is targeted for cases when you...

CISO Answers – with Michael Schindler

CISO Answers – with Michael Schindler

Security guru from Facebook, Juniper & Google: Nick BilogorskiyNick Bilogorskiy who has recently headed Trust and Security department at Google, exclusively for #UnderDefenseVlog has given an interview about his career path in cybersecurity. His CV includes such...

Web Application Penetration Testing

Web Application Penetration Testing

CISO Answers - Interview with Michael Schindler #CISOAnswers is a series of interviews with thought leaders in IT/IS seasoned with valuable insights on a variety of important topics. Watch our interview with - Michael Schindler - a leader with strong roots in the...

CISO Answers – Interview with Matthew Sciberras

CISO Answers – Interview with Matthew Sciberras

Web Application Penetration Testing - Case Study Client: International Marketing Service Firm providing winning strategies and execution for industry leaders Challenge:  Client data security and Compliance requirements from a very prominent customer were a initial...

UD team at NoNameCon 2019: outcomes and materials

UD team at NoNameCon 2019: outcomes and materials

CISO Answers – Interview with Matthew Sciberras “CISO Answers” is a series of interviews with thought leaders in IT/IS seasoned with valuable insights on a variety of important topics. The first of our exclusive CISO Interviewees is Matthew Sciberras - Director of...

Top cloud threats in 2019: secure your infrastructure

Top cloud threats in 2019: secure your infrastructure

UD team at NoNameCon 2019: outcomes and materialsNoNameCon was epic this year! We loved to see the growth of our community and contribute with speeches sharing our expertise! There were 3 speakers from UnderDefense, 2 Villages and 12 UD teamers who attended the...

Catch them! Secrets to detect attackers Maltese workshop

Catch them! Secrets to detect attackers Maltese workshop

CISO Answers - Interview with Michael Schindler #CISOAnswers is a series of interviews with thought leaders in IT/IS seasoned with valuable insights on a variety of important topics. Watch our interview with - Michael Schindler - a leader with strong roots in the...

IoT attack simulation and ways to protect

IoT attack simulation and ways to protect

Forwarding MySQL log file in AWS to Splunk: monitoring connectionsIntro Working for our client with a database hosted on Amazon, we have faced the case of forwarding MySQL log files in AWS to Splunk in order to monitor connections to the DB. According to safety...

Anomali and UnderDefense partnership

Anomali and UnderDefense partnership

IoT attack simulation and ways to protect Internet of Things rapidly changes lives of millions of people. The ramp up of technology also comes with security risks that are usually underestimated. In today’s world of “always on” technology and not enough security...

Mac based antimalware training

Mac based antimalware training

Keeping cyber crime in secret |Stories by ISACA Board Member "Radar" RileyKeeping cyber crime in secret? "Radar" Riley has many coaching stories and a good sense of humor under the hood. The interview focuses on the cyber threats current situation of educational and...

ISO 27001 assessment

ISO 27001 assessment

Why petroleum companies get shut down|Oil & Gas security New edition of UnderDefense Vlog with the main topic Oil and Gas security! In this video you’ll find tips for Petroleum companies on how to prevent cyber risks, discover threats that can make business blow,...

UnderDefense is product agnostic

UnderDefense is product agnostic

Women in Technology at UnderDefenseUnderDefense supports Women in Technology! We have a whole bunch of talented and brilliant female Security Specialists and proud of this beautiful part of our team! We are absolutely proud that 9 out of 36 UD-teamers (around 25%) are...

Roadmap of UD services

Roadmap of UD services

UD experts are not only in the cyber worldOur UnderDefense team had some truly great time this weekend! We regularly spend time together to build great communication between our teams and nurture company values.This time our little going-out-of-city became an...

2018 in numbers

2018 in numbers

CISO Answers – Interview with Matthew Sciberras “CISO Answers” is a series of interviews with thought leaders in IT/IS seasoned with valuable insights on a variety of important topics. The first of our exclusive CISO Interviewees is Matthew Sciberras - Director of...

NIST Cybersecurity Framework Assessment

NIST Cybersecurity Framework Assessment

Why petroleum companies get shut down|Oil & Gas security New edition of UnderDefense Vlog with the main topic Oil and Gas security! In this video you’ll find tips for Petroleum companies on how to prevent cyber risks, discover threats that can make business blow,...

Effortless Splunk Universal Forwarders update with Ansible

Effortless Splunk Universal Forwarders update with Ansible

New Service launch: SecOps AWS Best Practices Training and WorkshopWe at UnderDefense believe that cybersecurity is a must-have for any successful business. As far as the threat landscape continues to evolve, many customers now demand it more than before. Almost all...

Fraud Detection Speech at EBA

Fraud Detection Speech at EBA

Hidden aspects of mimikatz and infrastructure protection by Sysmon+Splunk In 2011 Benjamin Delpy released his side project that most recently became a key component of some ransomware worms that spread across Europe. Mimikatz became a ubiquitous tool in all manner of...

New Gen SIEM Tool development

New Gen SIEM Tool development

Hidden aspects of mimikatz and infrastructure protection by Sysmon+Splunk In 2011 Benjamin Delpy released his side project that most recently became a key component of some ransomware worms that spread across Europe. Mimikatz became a ubiquitous tool in all manner of...

Critical vulnerability in Linux and Mac

Critical vulnerability in Linux and Mac

Fraud Detection Speech at EBA UnderDefense team has attended a Breach&Fraud.IT meeting, which was organized by the European Business Association. Our CEO Nazar Tymoshyk and PM Mykhailo Hordych have presented there a speech about Data Breach Incident and its...

Top 3 research and rating platforms for cybersecurity

Top 3 research and rating platforms for cybersecurity

libssh vulnerability: Critical flaw in Linux and Mac SSH/SFTP services A critical vulnerability has been discovered in libssh - the implementation library for Secure Shell (SSH) that could allow anyone connect to computers remotely without knowing your password....

The best penetration test for your business

The best penetration test for your business

Top 3 research and rating platforms for cybersecurity The first step our potential customers take is visiting of the websites with independent ratings, reviews, and feedbacks online to check the quality, excellence, and professionalism of a vendor or service provider...

UnderDefense received the 3d place at SecOps Europe in 2018

UnderDefense received the 3d place at SecOps Europe in 2018

libssh vulnerability: Critical flaw in Linux and Mac SSH/SFTP services A critical vulnerability has been discovered in libssh - the implementation library for Secure Shell (SSH) that could allow anyone connect to computers remotely without knowing your password....

Windows 10 Start menu

Windows 10 Start menu

Top 3 research and rating platforms for cybersecurity The first step our potential customers take is visiting of the websites with independent ratings, reviews, and feedbacks online to check the quality, excellence, and professionalism of a vendor or service provider...

UnderDefense at AGS SIGMA conference

UnderDefense at AGS SIGMA conference

Windows 10 Start menu About AppLocker Creating AppLocker rules Summary Introduction Recently our security team discovered several issues with Windows 10 (Enterprise and Education versions) in Active Directory domain. We will try to describe how it all started, below....

UnderDefense’s engineer unlocked Splunk certifications

UnderDefense’s engineer unlocked Splunk certifications

UnderDefense at AGS SIGMA conferenceOur CEO Nazar Tymoshyk, and Head of BD Viktoria Miliar visited another great event in Kyiv. Both represented UnderDefense and our trusted partners Kyte Consultants Ltd at the annual summit #AGS SIGMA conference in Kyiv. Over two...

IoT Malware analysis project

IoT Malware analysis project

Windows 10 Start menu About AppLocker Creating AppLocker rules Summary Introduction Recently our security team discovered several issues with Windows 10 (Enterprise and Education versions) in Active Directory domain. We will try to describe how it all started, below....

Crypto markets & Smart-Contract Security

Crypto markets & Smart-Contract Security

UnderDefense at AGS SIGMA conferenceOur CEO Nazar Tymoshyk, and Head of BD Viktoria Miliar visited another great event in Kyiv. Both represented UnderDefense and our trusted partners Kyte Consultants Ltd at the annual summit #AGS SIGMA conference in Kyiv. Over two...

Eset Remote Administrator App for Splunk

Eset Remote Administrator App for Splunk

Crypto markets & Smart-Contract Security UnderDefense has recently completed 2 complex security assessment projects for cryptocurrency marketplaces. Our elite team of ethical hackers provided Solidity based Smart-Contract code assessment as well as discovered...

Windows Event Collector orchestration 2

Windows Event Collector orchestration 2

Crypto markets & Smart-Contract Security UnderDefense has recently completed 2 complex security assessment projects for cryptocurrency marketplaces. Our elite team of ethical hackers provided Solidity based Smart-Contract code assessment as well as discovered...

Windows Event Collector orchestration

Windows Event Collector orchestration

Eset Remote Administrator App for Splunk About data visualisation and Splunk apps Shortly about app App Description Summary Links About data visualization and Splunk apps The best method to explain the significance of information is to display it in a visual context....

Splunk Add-on for Eset Remote Administrator

Splunk Add-on for Eset Remote Administrator

Windows Event Collector orchestration Different Methods of log collection Splunk Universal Forwarder VS WEC How it works (Solution overview) Installation description Subscription creation process Summary Introduction This blog is one of many in a series that will...

Pin It on Pinterest