Three Common Email Security Mistakes That MSPs Make

Credit to Author: Trend Micro| Date: Tue, 27 Aug 2019 20:20:02 +0000

  MSPs can generate recurring revenue by being proactive about educating customers about email threats and how to defeat them—if they avoid three common mistakes.   Businesses have come to rely on cloud email and file-sharing applications for communication and productivity. But, too often, they assume these platforms’ built-in security delivers enough protection against email-borne…

The post Three Common Email Security Mistakes That MSPs Make appeared first on .

Read more

beVX Conference Challenge – HiTB

Credit to Author: SSD / Noam Rathaus| Date: Fri, 22 Jun 2018 11:30:44 +0000

During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: https://www.beyondsecurity.com/bevxcon/bevx-challenge-10 – that you had to download and reverse engineer and server that … Continue reading beVX Conference Challenge – HiTB

Read more

I run this SOC!

Credit to Author: dmitryc| Date: Tue, 05 Sep 2017 19:35:20 +0000

I don’t actually run this SOC (or any other) 🙂 But…but, as a certified “blue team” member, I’m pretty excited with the crop of new companies and ideas that are springing up in the area of SOC analysis, Deception technology, Lateral/external movement, etc. Some of the cool new(ish) vendors that I am falling deeply in … Continue reading I run this SOC!

Read more

Hack2Win – Code Blue 3rd Edition

Credit to Author: SSD / Research Team| Date: Mon, 21 Aug 2017 06:26:26 +0000

Hi everyone, We are excited to announce our 3rd Hack2Win Code Blue competition! This year we have changed the format, raised the difficulty level and increased the prizes. The goal of the event is to find who can gain the highest privileges on any of the target software and hardware. Prizes for this contest will … Continue reading Hack2Win – Code Blue 3rd Edition

Read more

Know your community – Celil ÜNÜVER

Credit to Author: SSD / Research Team| Date: Mon, 24 Jul 2017 09:57:46 +0000

Bug Bounty hunter – found and reported vulnerabilities in Microsoft, Apple, Adobe, IBM, Novell and more, Co-Founder of TRAPMINE and SignalSEC, Founder of NOPCon, speaker at PoC / Code Blue / Swiss Cyber Storm / CONFidence and more – please meet Celil ÜNÜVER Questions Q: How many years have you been working in the security … Continue reading Know your community – Celil ÜNÜVER

Read more

SSD Advisory – HTC Sync Remote Code Execution

Credit to Author: SSD / Research Team| Date: Mon, 27 Feb 2017 10:19:14 +0000

Vulnerabilities Summary The following advisory describes a remote code execution (RCE) found in HTC Sync version v3.3.63. Credit An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program. Vendor response The vulnerability was not reported to the vendor because the product has reached end of life on 31 August 2016 … Continue reading SSD Advisory – HTC Sync Remote Code Execution

Read more