Resource Hub
Dive deep into the realm of cybersecurity with our expert insights on Managed Detection and Response, Incident Response, Endpoint and Cloud Security, and more. Stay updated with the latest enhancements of the UnderDefense MAXI platform. Discover our trailblazing achievements and let our satisfied customers inspire you with their stories.
Tranform Your MSP Business into a Profitable MSSP in 5 Steps
Today, over 75,000* MSPs and only 10,000 MSSPs are operating on the market…
3 Key Critical Vulnerabilities and Mitigation Flows of Them
How to Protect Against LLMNR / NBT-NS Attacks, Zerologon, LLMNR,NTLM RELAY Introduction More and...
How to Be a Successful CISO & Back Home Satisfied
according to Matthew Sciberras Insightful talk between Nazar Tymoshyk, CEO of UnderDefense, and...
How to Detect CobaltStrike Command & Control Communication
CobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth...
Detecting DGA Domains: Machine Learning Approach
In this post we are going to take a look at Domain Generation Algorithms (DGA) and an interesting...
How to protect from COVID-19 Cyber Attacks
It is not new that COVID-19 pandemic influenced the lives of humanity in the XXI century. However,...
Detecting reconnaissance activity in your network
By Bogdan Vennyk One of the main services we provide at UnderDefense is 24×7 Monitoring with our...
N-day exploit development and upgrade to RCE
[CVE-2018-6231] Trend Micro Smart Protection Server Bypass Vulnerability + Code Execution By Taras...
Keeping cyber crime in secret |Stories by ISACA Board Member “Radar” Riley
https://www.youtube.com/watch?v=kuN9Q7OKjIk Keeping cyber crime in secret? “Radar” Riley has...
Why petroleum companies get shut down| Oil & Gas security with Chris Fair| UnderDefense Vlog
https://www.youtube.com/watch?v=YAHOlMznXW0 New edition of UnderDefense Vlog with the main topic...