Blog

Blog

IoT Device Testing Made Possible With BeStorm X

This article was originally published on TechTarget on April 22, 2019.In an international collaboration, U.S.-based Beyond Security and Japan-based Ubiquitous AI Corporation developed and launched BeStorm X, a vulnerability verification tool designed specifically to test IoT devices. The vendors claim the tool is an amalgamation of Beyond Security's BeStorm version 7.6.8 and UAC's IoT technologies...
Blog

The Pros & Cons of Network Diagrams

Do you know what devices are connected to your network? A network diagram can help you get a better sense of what's happening on your network. Check out the infographic to learn the pros and cons of network diagrams. s Not Loading? Check out the Text Version Keeping your network up and running can seem like an uphill battle. Especially without...
Blog

The Pros and Cons of Data Loss Prevention

Data Loss Prevention (DLP) helps organizations protect sensitive information by monitoring where data is stored, how it moves, and who accesses it. It uses rules to classify and inspect content, preventing unauthorized sharing that could pose risks—such as forwarding business emails externally or uploading files to personal cloud services. DLP is often implemented to address insider threats and comply with strict privacy laws governing data protection and access.
Blog

Compliance & Data Security Solutions Software Info

Compliance and Data Security:Do They Ever Meet?In my years working with technology and security data in the information security industry, I've heard numerous people confuse the word "compliance" with "security". We've all heard the stories in the news about an organization or company that was supposedly compliant with a particular ISO or NIST program imposed on them, only to find that later on...
Blog

What Is the One Thing We Can Do Right Now to Improve Our Cybersecurity?

This article was originally published on U.S. Chamber of Commerce on April 08, 2019.If you could create your own fantasy Board of Directors, who would be on it? CO— connects you with thought leaders from across the business spectrum and asks them to help solve your biggest business challenges. In this edition, a CO— reader asks how to improve a business’s cybersecurity when expert help isn’t...
Blog

Phishing Attacks - What is Phishing?

Although phishing attacks can occur against individuals, we will primarily focus on attacks against organizations in this post. We will use the term organization to represent governments, educational and healthcare institutions, and commercial businesses, but we will draw distinctions in the “bounty” sought after in each industry. So, let’s get started…What is Phishing?There are lot of “nice” or ...
Vulnerability Research

SoftNAS Cloud® Zero-day Blog

A vulnerability has been identified in SoftNAS Cloud(R) data storage platform discovered by our Vulnerability Research Team (VRT). The engineers at SoftNAS are to be commended for their prompt response to the identified flaw and their team’s work with VRT to provide prompt fixes for this cyber security issue.SoftNAS has provided a patch for the vulnerability identified on the application. The...
Blog

Brain-hacking: Why Social Engineering Is So Effective

You encounter social engineering tactics every day, often without even noticing them.From an information security perspective, Wikipedia defines social engineering as the psychological manipulation of people into performing actions or revealing confidential information. While that definition is accurate, it only captures part of the picture. Social engineering extends beyond cybersecurity and...
Blog

GDPR-Ready Companies Experiencing Fewer Breaches

A new survey says GDPR compliant companies are benefiting from their recent privacy investments - as a bonus, they may be less likely to be breached, too.
Blog

Microsoft Launches Windows Sandbox

Microsoft unveiled a new sandbox for Windows this week that can allow users to run untrusted software without having to do so in a virtual machine.
Vulnerability Research

Analysis of NUUO NVRmini2 Stack Overflow Vulnerability

Exploiting CVE-2018-19864- Samuel S., Senior Vulnerability ResearcherDuring an audit of NUUO’s NVRmini2, a stack overflow vulnerability was discovered in a request handling function in the ‘lite_mv’ custom SIP service binary. The NUUO NVRmini2 runs a custom SIP service on TCP ports 5160 and 5150 via a binary at /NUUO/bin/lite_mv. In order to examine this bug more closely, we analyze the function...