Blogs

CRITICALSTART’s TEAMARES Launches DeimosC2
Flexible, Open-Source Tool to Manage Post-Exploitation Issues – Without the Extra Spend

EDR Tools: What They Are & Why You Need Them

F5 BIG-IP Remote Code Execution Exploit – CVE-2020-5902
When TEAMARES began research into the vulnerability identified in the F5 TMUI RCE vulnerability advisory released last month, we initially started by reading the advisory and mitigation steps, which contained minimal details but included key pieces of information needed to kick off our research.

Webinar: Lessons Learned from Billion Dollar Breaches

Globally, breaches cost organizations billions of dollars every year. In the U.S., losses for each breach average just under $10 million.

Threat Hunting: Proactive Incident Response
Organizations often don’t realize they’ve been breached, giving malicious actors the freedom to dwell in their network undetected for weeks or months at a time, collecting data and other confidential information.

Uncovering Your Security Blind Spots: Keys to Protecting your Organization from the Unknown
Many organizations are shocked to learn their systems have been breached, with attackers having exposed vulnerabilities. However, you can defend your organization against these threats by taking some proactive measures.

MDR vs MSSP: What are they? How do they work?

Outer Space Meets Cyberspace: What Space Travel Can Teach Us About Cybersecurity
February 20, 1962: An Atlas LV-3B launch vehicle lifts off from Launch Complex 14 at Cape Canaveral, Florida. It’s lifting astronaut John Glenn into orbit aboard the Mercury program spacecraft known as Friendship 7.

Local Privilege Escalation Discovered in GlobalProtect App

Versions Tested:

How Security Teams Eliminate Risk Acceptance with MDR
Recent data shows that 83 percent of IT security professionals are feeling more overworked in 2020 than in 2019, and 82 percent felt that their teams were understaffed.

Securing Your Cookies: HTTPOnly Flag for Cookie Theft Defense
Missing HttpOnly flags on cookies are a common finding in Web Application penetration testing. Many times, there is confusion surrounding whether it is necessary to enable this flag though. However, cookies can contain session tokens and other values that can be useful to a malicious actor and should be protected.

Local Privilege Escalation Discovered in VMware Fusion

Versions Tested:
VMware Fusion 11.5.3
Products: