Blog

  • The most critical Windows 10 vulnerabilities for 2021

    Windows 10 is probably the most used Operating System (OS) in organizations these days. The fact that every level of user in the organization, from IT experts to entities that has

    Read More
  • Overcoming the 3 biggest challenges in system hardening

    As delivered from the manufacturer, your network systems’ default configurations are often function-oriented rather than security-oriented. Changing the system’s default configuration to a more secure form is what we refer to

    Read More
  • LDAP in the context of Active Directory

    Lightweight Directory Access Process (LDAP) is a user authentication process developed for directory services. This protocol is usually used by applications for searching resource information such as users and different system

    Read More
  • How to Configure Domain Controllers for Enhanced Security- User Rights

    Domain Controllers (DC) controls the server’s authentication approvals and user verification. The DC controls the access to the Active Directory, therefore having a vulnerable DC means being exposed to some of

    Read More
  • 3 Key Principles in Active Directory Security

    Active Directory has become a prime target for cyber-attacks. Back in 2015, it was already estimated that 95 million Active Directory accounts are compromised each day, and numbers are increasing since

    Read More
  • Configuring SSH For Enhanced Security

    Secure Shell (SSH) is a network protocol used to connect devices over the internet via a terminal. It is also used to share files between two remote devices securely. SSH is

    Read More
  • Deep Dive Into Hardening Automation

    Automation is often mentioned in the context of hardening. It is reasonable since the task of hardening is complex and tangled, especially when done in large and complex infrastructures. In fact,

    Read More
  • Restrict NTLM Incoming traffic

    NTLM is Microsoft’s old mythological authentication protocol. Although new and better authentication protocol has already been developed, NTLM is still very much in use. Even the most recent Windows versions support

    Read More
  • Mitigating PetitPotam NTLM Vulnerability

    NTLM is a veteran authentication protocol. It is known to be insecure, therefore there are better options to replace it in the market. Yet, getting rid of it can be tough

    Read More
  • SeriousSAM (Windows 10&11 Vulnerability) Mitigation Walkthrough

    A new vulnerability in Windows 10 and Windows 11 was discovered a few days ago. The vulnerability – SeriousSAM , allows attackers with user account access to perform a Pass-the-Hash (and

    Read More
  • Your First 5 Steps in Linux Server Hardening

    When installing a new Linux server, you should be aware that its level of security is very low by default, to allow as much functionality as possible. Therefore, performing basic hardening

    Read More
  • How to Mitigate Print Spooler’s PrintNightmare Vulnerability

    A few days ago, PrintNightmare – Microsoft’s Print Spooler vulnerability (CVE-2021-34527), which was classified ‘Low’ in its criticality level, got upgraded to be classified as ‘critical’. The reason for this is

    Read More