BLOG

What does it take to go from Cybersecurity to Cyber resilience

What does it take to go from Cybersecurity to Cyber Resilience As the threat landscape grows in complexity and moves at a far greater pace, companies are now coming to realize that having a complete cybersecurity is practically impossible. Cyberattacks are not a question of ‘if’ but ‘when’. Many organizational

Read more »

SIGRed vulnerability

SIGRed Vulnerability A vulnerability named SIGRed and numbered CVE-2020-1350 was discovered in 2020 May by the Checkpoint Security Research Team. RISKS Remote code execution Server compromission Data exfiltration AFFECTED SYSTEMS The following server versions are affected (when the DNS service is activated): Windows Server 2008 for 32-bit Systems Service Pack

Read more »

EUROPEAN NETWORK SENSORS

EUROPEAN NETWORK SENSORS When reviewing logs from a company, TEHTRIS CERT found multiple instances where an IP address had been trying to contact sensitive servers. Since these servers were unknown to open source databases, an investigation was conducted to understand how a potential attacker could identify the IP addresses of

Read more »

TEHTRIS Updates, June 2020: Data for Cybersecurity

TEHTRIS Updates, June 2020: Data for Cybersecurity Context At TEHTRIS, we strongly believe that innovation is extremely important in cybersecurity. We place it at the heart of all our concerns, which results in major updates every 4 months. We have created a regular cycle of innovation, while maintaining a certain

Read more »

Uncovering Attackers and Anomalies Faster with Data-led Cybersecurity

Uncovering Attackers and Anomalies Faster with Data-led Cybersecurity Organizations are now facing an increasing set of cyberattacks from various places. Cybercriminals don’t just cost a business hard-earned cash, but they can also ruin its reputation, causing distrust in their existing, past, and potential customers. Cybersecurity experts are constantly trying to

Read more »

UPnP CallStranger vulnerability

UPnP CallStranger vulnerability RISKS Remote code execution Data exfiltration Involuntary participation in a DDOS attack AFFECTED SYSTEMS List being updated whose vulnerability is confirmed: Windows 10 – upnphost.dll 10.0.18362.719 Xbox One- OS Version 10.0.19041.2494 ADB TNR-5720SX Box (TNR-5720SX/v16.4-rc-371-gf5e2289 UPnP/1.0 BH-upnpdev/2.0) Asus ASUS Media Streamer Asus Rt-N11 Belkin WeMo Broadcom ADSL

Read more »

Data-driven Cybersecurity: Unraveling Insights for Better IT Security

Data-driven Cybersecurity: Unraveling Insights for Better IT Security In traditional cybersecurity arrangements, data had little to no role to play. It was managed in an ad hoc manner and manually handled by security analysts. However, as cybersecurity attacks increased in volume and complexity, such conventional approaches met limitations in mitigating

Read more »

RCE on PRTG Network Monitor – TEHTRIS PENTEST

RCE on PRTG Network Monitor TEHTRIS PENTEST Earlier this year, a TEHTRIS team has been mandated in order to conduct a remote pentest. The maturity level of the information system audited didn’t allow to identify any vulnerability directly exposed on the internet. TEHTRIS then decided to dig deeper into the

Read more »