<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

Security Advisory VMSA-2021-0002

VMware ESXi and vCenter Server updates address multiple security vulnerabilities.

Security Advisory Vulnerability CVE-2021-22986

Datashield recommends patching any BIG-IP servers due to the recently released series of vulnerabilities, CVE-2021-22986 in particular, a pre-auth RCE in the iControl REST interface. An unauthenticated attacker can compromise the server and obtain access into the network. If your team is unable to patch these servers immediately, we recommend following the mitigation steps outlined in the notice sent out by F5, which is below as well.

The case for Google Chronicle in a Supply Chain Attack

In light of the recent SolarWinds Orion “SUNBURST” Supply Chain attack, there is a strong use case for deploying Google Chronicle to protect your network and organization against a similar attack.

What Makes a Best-in-Class Managed Detection and Response Provider?

Managed Detection and Response (MDR) service providers refer to companies that offer turnkey threat detection and response tools to end-users or security teams through security operations center technologies. MDR services protect cloud-based infrastructure, IT networks, cyber-physical systems, apps, devices, and on-premise assets. The managed security service providers offer round-the-clock monitoring to ensure security incidents can be detected in real-time and mitigated quickly.

RSA NetWitness: UEBA Overview

  The era of individual threat actors has been replaced by organized syndicates utilizing sophisticated processes to break through expansive networks and IT architecture.

How a SOC Handles Credential Harvesting

By Nick Sandin, Security Analyst and contributing author Brandon Doty, SOC Manager Dealing with credential harvesters has its perks. Day in and day out I get to personally observe how sophisticated a phishing website can be. Some websites are so elaborate that only a trained analyst can identify them, while others are so obvious no one in their right mind would fall for it. Either way, if it looks suspicious just follow the “POST”.

    Related Posts