How to protect from COVID-19 Cyber Attacks

How to protect from COVID-19 Cyber Attacks

How to protect from COVID-19 Cyber Attacks: Practical Use-Case By Mykhailo Pazyniuk It is not new that COVID-19 pandemic influenced the lives of humanity in the XXI century. However, it has influenced not only health and economy. Cyber criminals have been quick to...
Black Friday. How To Avoid Major Cybersecurity Risks

Black Friday. How To Avoid Major Cybersecurity Risks

Black Friday. How To Avoid Major Cybersecurity Risks By Iryna Yamborska Black Friday is coming! Pleasant time of hot sales. Pleasant not only to those people who prepare Christmas gifts but also to hackers who want to make money on the desire of users to buy cheaper...
Incident Response Life Cycle| UnderDefense

Incident Response Life Cycle| UnderDefense

Incident Response Lifecycle|UnderDefense What is the Incident Response Lifecycle? With COVID-19 forcing businesses around the globe to shift to remote work, the cybersecurity landscape has changed significantly. Consequently, the complexity of protecting corporate...
ISO27001 auditor certificate

ISO27001 auditor certificate

UnderDefense enhance its presence and capabilities in compliance – more ISO27001 auditor certificates Compliance is getting harder year to year Organizations of all industries and sizes are facing more compliance regulations every year. Regulators no longer just...
N-day exploit development and upgrade to RCE

N-day exploit development and upgrade to RCE

Write-up:N-day exploit development and upgrade to RCE [CVE-2018-6231] Trend Micro Smart Protection Server Bypass Vulnerability + Code Execution By Taras Zelyk, Serhiy Sych, Bogdan Vennyk “At UnderDefense we are not only hunting for vulnerabilities and analyzing their...

Pin It on Pinterest