Cyber Security Month: Download Virtual Posters, Zoom Backgrounds & Wallpapers

Blogs

Stay tuned with the latest news and updates from cyber security ecosystem.

Posted on 18th Oct, 2020 | By Sumeetha 5 Minutes

Oct 7: CSW Patch Watch & Security Updates

In our Oct 7 edition of Patch Watch, we have 13 vendors (Apple, CISCO, IBM, RedHat, Dell, Android and others) who released 93 patches, hotfixes and security updates.

Read More

Posted on 15th Oct, 2020 | By Sumeetha 5 Minutes

Cyber Hygiene: Ransomware is causing critical care disruption in hospitals

We analyzed three ransomware incidents (Ryuk, Revil & AKO) and found 16 CVEs associated with them. Incidentally, CSW warned about five of these CVEs in our cyber risk series way back in March 2020!

Read More

Posted on 12th Oct, 2020 | By Sumeetha 5 Minutes

Sep 30: CSW Patch Watch & Security Updates

Two weeks ago, CISCO, Citrix, IBM, Pulse Secure, Amazon, Dell, RedHat and many others  released security updates.

Read More

Posted on 1st Oct, 2020 | By Pavithra 5 Minutes

Sep 23: CSW Patch Watch & Security Updates

Last week, Apple, CISCO, Google, Linux, and many other popular vendors released advisories for 105 vulnerabilities.

Read More

Posted on 29th Sep, 2020 | By Sumeetha 3 Minutes

Our warning in 2020 was ignored: Lack of Cyber Hygiene is amplifying Ransomware attacks and causing havoc

Ransomware campaigns are always on prowl for a path of least resistance to gain initial access and move laterally using well known vulnerabilities.

Read More

Posted on 21st Sep, 2020 | By Bhavithra 2 Minutes

How to detect vulnerability CVE-2020-24601?

Cyber Security Works has discovered a new zero-day vulnerability, CVE-2020-24601 in Ignite Realtime Openfire 4.5.1.

Read More

Posted on 21st Sep, 2020 | By Bhavithra 2 Minutes

How to detect vulnerability CVE-2020-24602?

Cyber Security Works discovered a new zero-day vulnerability, CVE-2020-24602 in Ignite Realtime Openfire 4.5.1. Openfire (formerly Wildfire).

Read More

Posted on 21st Sep, 2020 | By Bhavithra 2 Minutes

How to detect Vulnerability CVE-2020-24604?

Cyber Security Works discovered a reflected XSS vulnerability, CVE-2020-24604, in Ignite Realtime Openfire 4.5.1. Openfire (formerly Wildfire).

Read More

Posted on 3rd Sep, 2020 | By Bhavithra 3 Minutes

How to detect the vulnerability CVE-2020-14723?

A new zero-day vulnerability, CVE-2020-14723, was discovered by Cyber Security Works in Oracle Help Technologies related to the Web UIX component.

Read More

Posted on 30th Aug, 2020 | By Sumeetha 2 Minutes

India's Cybersecurity Policy: Disclosure of Data Breaches

Will the new national cybersecurity policy include a disclosure policy similar to what the west has?

Read More

Posted on 5th Aug, 2020 | By Sumeetha 3 Minutes

WastedLocker Ransomware Attack: Indicators of compromise (IOCs)

Evil Corp used compromised legitimate websites to deliver ransomware in Garmin’s environment. The attack caused a 5-day outage for their product users. CSW Analysts have put together a list of domains, hashes, IOCs that have been compromised. Download the list to update your IPS/IDS and avoid being attacked.

Read More

Posted on 28th Jul, 2020 | By Sumeetha 5 Minutes

How to detect CVE-2020-5902?

CVE-2020-5902 is a critical remote code vulnerability that was discovered in the F5 Networks Big-IP administrative interface. From discovery to mitigation, see how things unfolded and check out CSW’s script to detect this vulnerability in Big-IP products.

Read More

Posted on 19th Jul, 2020 | By Sumeetha 3 Minutes

How safe are Web Proxy?

Today, the reliance on applications such as web proxy, remote conferencing, VPNs, etc. are at an all-time high which is yet another reason for threat actors to work overtime to exploit vulnerabilities.

Read More

Posted on 19th Jul, 2020 | By Sumeetha 3 Minutes

How safe are Databases?

Cyber threat actors have been working hard during these pandemic times. Systems, infrastructure, and sensitive information that was hitherto viewed within the secure walls of one’s office is now being accessed through insecure connections and unsafe laptops from one’s home.

Read More

Posted on 19th Jul, 2020 | By Sumeetha 5 Minutes

How safe are Enterprise Data Storage Systems?

While Enterprise data storage systems are great to work with, they are also sitting ducks for threat attacks. Find out how?

Read More

Posted on 19th Jul, 2020 | By Sumeetha 5 Minutes

How safe are VPN solutions?

Travelex fell prey to a ransomware attack (on New Year’s Eve) because they failed to install a patch issued by their VPN - Pulse Secure. How safe are our VPNs? Let's find out.

Read More

Posted on 15th Jul, 2020 | By Sumeetha 5 Minutes

Atlassian’s new features and the Shift Left Revolution

All scanners list out security vulnerabilities but does the developer know what to fix first and how to go about it?

Read More

Posted on 14th Jul, 2020 | By Sumeetha 7 Mins Read

How safe are online conferences?

With the recent breaches in Zoom application and increasing instances of ‘zoombombing’ and data theft, a definitive study of popular online video conferencing tools was needed. Take a read.

Read More

Posted on 14th Jul, 2020 | By Team CSW 5 Mins Read

How safe are your Tech Stacks?

This April, Cognizant fell prey to a nasty ransomware attack whose ripple effect has shaken the world. How safe is your tech stack? Let's take a look.

Read More