Blogs

Blog Image

CRITICALSTART’s TEAMARES Launches DeimosC2

Flexible, Open-Source Tool to Manage Post-Exploitation Issues – Without the Extra Spend

Blog Image

EDR Tools: What They Are & Why You Need Them

EDR tools enable endpoint visibility and detection of threats via registry monitoring, searching for modifications to file structures, and validating signatures.
Blog Image

F5 BIG-IP Remote Code Execution Exploit – CVE-2020-5902

When TEAMARES began research into the vulnerability identified in the F5 TMUI RCE vulnerability advisory released last month, we initially started by reading the advisory and mitigation steps, which contained minimal details but included key pieces of information needed to kick off our research.

Blog Image

Webinar: Lessons Learned from Billion Dollar Breaches

Globally, breaches cost organizations billions of dollars every year. In the U.S., losses for each breach average just under $10 million.

Blog Image

Threat Hunting: Proactive Incident Response

Organizations often don’t realize they’ve been breached, giving malicious actors the freedom to dwell in their network undetected for weeks or months at a time, collecting data and other confidential information.

Blog Image

Uncovering Your Security Blind Spots: Keys to Protecting your Organization from the Unknown

Many organizations are shocked to learn their systems have been breached, with attackers having exposed vulnerabilities. However, you can defend your organization against these threats by taking some proactive measures.

Blog Image

MDR vs MSSP: What are they? How do they work?

What are the advantages and limitations of each - MDR vs MSSP - and how do they function in a layered digital protection platform?
Blog Image

Outer Space Meets Cyberspace: What Space Travel Can Teach Us About Cybersecurity

February 20, 1962: An Atlas LV-3B launch vehicle lifts off from Launch Complex 14 at Cape Canaveral, Florida. It’s lifting astronaut John Glenn into orbit aboard the Mercury program spacecraft known as Friendship 7.

Blog Image

How Security Teams Eliminate Risk Acceptance with MDR

Recent data shows that 83 percent of IT security professionals are feeling more overworked in 2020 than in 2019, and 82 percent felt that their teams were understaffed.

Blog Image

Securing Your Cookies: HTTPOnly Flag for Cookie Theft Defense

Missing HttpOnly flags on cookies are a common finding in Web Application penetration testing. Many times, there is confusion surrounding whether it is necessary to enable this flag though. However, cookies can contain session tokens and other values that can be useful to a malicious actor and should be protected.

Blog Image

Local Privilege Escalation Discovered in VMware Fusion

Versions Tested:
VMware Fusion 11.5.3

Products: