Risk-based cyber resiliency

Risk-based cyber resiliency

Risk based cyber resiliency Customer view: Guest blog by Michael Rezek, VP, Cybersecurity Strategy at Accedian It’s may be possible to spend less on cybersecurity and get more protection What we have witnessed over the last couple of decades as the traditional...
Black Friday. How To Avoid Major Cybersecurity Risks

Black Friday. How To Avoid Major Cybersecurity Risks

Black Friday. How To Avoid Major Cybersecurity Risks By Iryna Yamborska Black Friday is coming! Pleasant time of hot sales. Pleasant not only to those people who prepare Christmas gifts but also to hackers who want to make money on the desire of users to buy cheaper...
Incident Response Life Cycle| UnderDefense

Incident Response Life Cycle| UnderDefense

Incident Response Life Cycle|UnderDefense What is the Incident Response Life Cycle? With COVID-19 forcing businesses around the globe to shift to remote work, the cybersecurity landscape has changed significantly. Consequently, the complexity of protecting corporate...
ISO27001 auditor certificate

ISO27001 auditor certificate

UnderDefense enhance its presence and capabilities in compliance – more ISO27001 auditor certificates Compliance is getting harder year to year Organizations of all industries and sizes are facing more compliance regulations every year. Regulators no longer just...
N-day exploit development and upgrade to RCE

N-day exploit development and upgrade to RCE

Write-up:N-day exploit development and upgrade to RCE [CVE-2018-6231] Trend Micro Smart Protection Server Bypass Vulnerability + Code Execution By Taras Zelyk, Serhiy Sych, Bogdan Vennyk “At UnderDefense we are not only hunting for vulnerabilities and analyzing their...

Pin It on Pinterest