emailUNDER ATTACK? helpme@cyber-arm.com

Top Categories

Spotlight

todayJuly 3, 2021

Cyber security + Global news + Vulnerability Mitigation CyberArm Team

Risk advisory: printnightmare

CyberArm’s risk advisories are intended for senior management to aid their understanding of current events and the cyber risk posed to their organizations. What has happened? A vulnerability in the ‘print spooler’ (which handles interactions between the operating system and USB or network printers) for Microsoft Windows has been identified [...]

Top Voted
Sorry, there is nothing for the moment.

Blog

7 Results / Page 1 of 1

todayJuly 3, 2021

  • 28
close

Cyber security + Global news + Vulnerability Mitigation CyberArm Team

Risk advisory: printnightmare

CyberArm’s risk advisories are intended for senior management to aid their understanding of current events and the cyber risk posed to their organizations. What has happened? A vulnerability in the ‘print spooler’ (which handles interactions between the operating system and USB or network printers) for Microsoft Windows has been identified ...

Cyber security Hasan Jradi / June 4, 2021

how to properly configure your firewall | cyberarm

Firewalls are critical components of your enterprise network and comes in various shapes and sizes, from basic statefull firewall, to full “Next-Generation” with threat prevention and sandboxing. Firewalls have evolved to protect even your cloud services and assets. If misconfigured, your network will be vulnerable to cyber attacks. By their ...

todayMarch 27, 2021

  • 75
close

Data Protection CyberArm Team

avoid dlp Deployment drawbacks

How to ensure having an effective DLP implementation? Protecting digital assets and intellectual property (IP) is becoming increasingly challenging for organizations. Recent studies describe external hacking as the primary cause of data loss in the corporate world; however, organizations have few mechanisms to assess and report data losses through internal ...

todayMarch 21, 2021

  • 41
close

Vulnerability Mitigation CyberArm Team

F5 BIG-IP/BIG-IQ CRITICAL Vulnerability

This post by Rich Warren and Sander Laarhoven discusses NCC Group observed in the wild exploitation attempts and detection logic for the F5 BIG-IP/BIG-IQ iControl REST API vulnerabilities CVE-2021-22986. Update March 20th, 2021 We have seen PoCs of a variant posted to Twitter that doesn’t require SSRF, our advice is ...

todayMarch 6, 2021

  • 92
close

Global news + Vulnerability Mitigation CyberArm Team

Mitigate Microsoft Exchange Server Vulnerabilities

Note: This Alert was updated by our security researchers on March 4, 2021 to provide further guidance.  CyberARM has observed active exploitation of vulnerabilities in Microsoft Exchange Server products. Successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute arbitrary code on vulnerable Exchange Servers, enabling the attacker to gain ...

todayMay 6, 2020

  • 78
close

Incident Handling CyberArm Team

Simplify Incident Management & Response

“When you react, you let other control you. When you respond, you are in control.”― Bohdi Sanders, It’s obvious we cannot achieve 100% security so we always tend to build blocks and set plans to recover our data or systems when bad things happen to reduce the risk to a ...