emailUNDER ATTACK? helpme@cyber-arm.com

Top Categories

Spotlight

todayAugust 19, 2022

News & Events CyberArm Team

Neustar and CyberArm Announce Strategic Partnership

CyberArm partners with Neustar Security Services to offer best-in-class DNS, application, and network security CyberArm and Neustar Security Services are pleased to announce our entrance into a strategic partnership, combining CyberARM’s industry leading Managed Security & Consulting Services with Neustar Security’s cloud-delivered security services to enable businesses to thrive online. [...]

Top Voted
Sorry, there is nothing for the moment.

Blog

10 Results / Page 1 of 1

todayAugust 19, 2022

  • 136
close

News & Events CyberArm Team

Neustar and CyberArm Announce Strategic Partnership

CyberArm partners with Neustar Security Services to offer best-in-class DNS, application, and network security CyberArm and Neustar Security Services are pleased to announce our entrance into a strategic partnership, combining CyberARM’s industry leading Managed Security & Consulting Services with Neustar Security’s cloud-delivered security services to enable businesses to thrive online. ...

todayOctober 5, 2021

  • 166
close

Cyber Awareness Hasan Jradi

Beware of Survivorship Bias in Cybersecurity

Survival Bias is a type of selection bias that occurs when a non-representative subset of data is used to draw conclusions. What does this mean? Consider Figure 1 below, let’s say you were tasked to examine the damage of aircraft that had returned from missions and recommend the best place ...

todaySeptember 27, 2021

  • 14
close

News & Events CyberArm Team

EC-Council and CyberArm Strategic Partnership

In response to the expanding threat landscape, EC-Council and CyberArm, KSA, have entered into a strategic alliance to cultivate a security-aware culture. Source: EC-Council and CyberArm Unite to Foster the Growth of Cybersecurity Talent and Facilitate Workforce Development in Riyadh – EC-Council Logo (eccouncil.org) Riyadh, Kingdom of Saudi Arabia, September ...

todayJuly 3, 2021

  • 82
close

Vulnerability Mitigation + Cyber security + Global news CyberArm Team

Risk advisory: printnightmare

CyberArm’s risk advisories are intended for senior management to aid their understanding of current events and the cyber risk posed to their organizations. What has happened? A vulnerability in the ‘print spooler’ (which handles interactions between the operating system and USB or network printers) for Microsoft Windows has been identified ...

Cyber security Hasan Jradi / June 4, 2021

how to properly configure your firewall | cyberarm

Firewalls are critical components of your enterprise network and comes in various shapes and sizes, from basic statefull firewall, to full “Next-Generation” with threat prevention and sandboxing. Firewalls have evolved to protect even your cloud services and assets. If misconfigured, your network will be vulnerable to cyber attacks. By their ...

todayMarch 27, 2021

  • 116
close

Data Protection CyberArm Team

avoid dlp Deployment drawbacks

How to ensure having an effective DLP implementation? Protecting digital assets and intellectual property (IP) is becoming increasingly challenging for organizations. Recent studies describe external hacking as the primary cause of data loss in the corporate world; however, organizations have few mechanisms to assess and report data losses through internal ...

todayMarch 21, 2021

  • 161
close

Vulnerability Mitigation CyberArm Team

F5 BIG-IP/BIG-IQ CRITICAL Vulnerability

This post by Rich Warren and Sander Laarhoven discusses NCC Group observed in the wild exploitation attempts and detection logic for the F5 BIG-IP/BIG-IQ iControl REST API vulnerabilities CVE-2021-22986. Update March 20th, 2021 We have seen PoCs of a variant posted to Twitter that doesn’t require SSRF, our advice is ...

todayMarch 6, 2021

  • 128
close

Global news + Vulnerability Mitigation CyberArm Team

Mitigate Microsoft Exchange Server Vulnerabilities

Note: This Alert was updated by our security researchers on March 4, 2021 to provide further guidance.  CyberARM has observed active exploitation of vulnerabilities in Microsoft Exchange Server products. Successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute arbitrary code on vulnerable Exchange Servers, enabling the attacker to gain ...

todayMay 6, 2020

  • 108
close

Incident Handling CyberArm Team

Simplify Incident Management & Response

“When you react, you let other control you. When you respond, you are in control.”― Bohdi Sanders, It’s obvious we cannot achieve 100% security so we always tend to build blocks and set plans to recover our data or systems when bad things happen to reduce the risk to a ...