BLOG

Zerologon Vulnerability

Zerologon Vulnerability A vulnerability named Zerologon, with the number CVE-2020-1472, has been made public on August 11, 2020 by Microsoft [1]. It impacts MS-NRPC [2], a protocol required for the proper operation of a Microsoft domain, and used by domain controllers (RODC [3] included). On September 11, 2020, an exploitation

Read more »

What does it take to go from Cybersecurity to Cyber resilience?

What does it take to go from Cybersecurity to Cyber Resilience? As the threat landscape grows in complexity and moves at a far greater pace, companies are now coming to realize that having a complete cybersecurity is practically impossible. Cyberattacks are not a question of ‘if’ but ‘when’. Many organizational

Read more »

SIGRed vulnerability

SIGRed Vulnerability A vulnerability named SIGRed and numbered CVE-2020-1350 was discovered in 2020 May by the Checkpoint Security Research Team. RISKS Remote code execution Server compromission Data exfiltration AFFECTED SYSTEMS The following server versions are affected (when the DNS service is activated): Windows Server 2008 for 32-bit Systems Service Pack

Read more »

European network sensors

EUROPEAN NETWORK SENSORS When reviewing logs from a company, TEHTRIS CERT found multiple instances where an IP address had been trying to contact sensitive servers. Since these servers were unknown to open source databases, an investigation was conducted to understand how a potential attacker could identify the IP addresses of

Read more »

TEHTRIS Updates, June 2020: Data for Cybersecurity

TEHTRIS Updates, June 2020: Data for Cybersecurity Context At TEHTRIS, we strongly believe that innovation is extremely important in cybersecurity. We place it at the heart of all our concerns, which results in major updates every 4 months. We have created a regular cycle of innovation, while maintaining a certain

Read more »

Uncovering Attackers and Anomalies Faster with Data-led Cybersecurity

Uncovering Attackers and Anomalies Faster with Data-led Cybersecurity Organizations are now facing an increasing set of cyberattacks from various places. Cybercriminals don’t just cost a business hard-earned cash, but they can also ruin its reputation, causing distrust in their existing, past, and potential customers. Cybersecurity experts are constantly trying to

Read more »

UPnP CallStranger vulnerability

UPnP CallStranger vulnerability RISKS Remote code execution Data exfiltration Involuntary participation in a DDoS attack AFFECTED SYSTEMS List of systems being updated whose vulnerability is confirmed: Windows 10 – upnphost.dll 10.0.18362.719 Xbox One – OS Version 10.0.19041.2494 ADB TNR-5720SX Box (TNR-5720SX/v16.4-rc-371-gf5e2289 UPnP/1.0 BH-upnpdev/2.0) ASUS Media Streamer ASUS Rt-N11 Belkin WeMo

Read more »

Data-driven Cybersecurity: Unraveling Insights for Better IT Security

Data-driven Cybersecurity: unraveling Insights for Better IT Security In traditional cybersecurity arrangements, data had little to no role to play. It was managed in an ad hoc manner and manually handled by security analysts. However, as cybersecurity attacks increased in volume and complexity, such conventional approaches met limitations in mitigating

Read more »

RCE on PRTG Network Monitor – TEHTRIS PENTEST

RCE on PRTG Network Monitor TEHTRIS PENTEST Earlier this year, a TEHTRIS team has been mandated in order to conduct a remote pentest. The maturity level of the information system audited didn’t allow to identify any vulnerability directly exposed on the internet. TEHTRIS then decided to dig deeper into the

Read more »

Can we dream of a fully automated XDR Platform? Yes, we can!

Can we dream of a fully automated XDR Platform? Yes, we can! XDR platforms are our response to the increasing sophistication of the tools and tactics cyber attackers use, that render anti-virus programs and other traditional cybersecurity solutions helpless. XDR makes a case for a more holistic cybersecurity approach that

Read more »

Windows Type 1 Font Parsing RCE Vulnerability – Microsoft ADV200006

Windows Type 1 Font Parsing RCE Vulnerability – Microsoft ADV200006 On the 23rd of March 2020, Microsoft has released an important security advisory concerning two critical flaws allowing a remote code execution (RCE). Theses flaws exists in the way that Windows Adobe Type Manager improperly handles some specially crafted fonts.

Read more »

EDR – COVID-19

EDR – COVID-19: TEHTRIS MAKES A COMMITMENT COVID-19: TEHTRIS EDR PROTECT HOSPITALS WORLWIDE Our country and our world are shaken by the current health and economic crisis. In response to the COVID-19 coronavirus pandemic, Cedric O, Secretary of State in charge of Digital Affairs within the French government, has launched

Read more »

Why XDR platforms are becoming the smartest cybersecurity solution?

Why XDR platforms are becoming the smartest cybersecurity solution? Cybercrime is an ever-expanding risk confronting companies of all sizes in all industries. To shield themselves from the many cyberattacks they are prone to, teams must stay a stride ahead of cybercriminals by safeguarding their assets from a torrent of progressively

Read more »

What does a holistic cybersecurity strategy look like?

What does a holistic cybersecurity strategy look like? The difference between a traditional and a holistic cybersecurity approach IT and top technical products are no more responsible alone for the security of our digital assets. Cybersecurity now needs a strategy. One that involves technology, the people, and the processes. As

Read more »