Blogs

Blog Image

Why a Proactive IR Strategy Is Critical

Breaches are a fact of life for every business.

Blog Image

COVID-19 Contact Tracing Methods Compared: Examining Privacy & Security Implications

Discussions about contact tracing have been ongoing since February 2020, when some experts began looking ahead at how to move through the global COVID-10 pandemic.

What Is Contact Tracing?

Contact tracing essentially comprises identifying those who have been infected with COVID-19 and notifying as many people as possible who have been in close contact with them within a 14-day window.

Blog Image

Zero-Trust and Micro-Segmentation

Adoption of Zero-Trust and Micro-Segmentat

Blog Image

Weaponizing Public Breach Data Dumps for Red Teamers

Public password dumps have been an excellent way for attackers to gain access to accounts. Whether through credential stuffing or utilizing the emails and passwords directly, these dumps are a treasure trove of information. One thing red teamers and malicious actors alike can always count on is that the average user will likely reuse one password across multiple accounts.

Blog Image

Ransomware and the CIA Triad: Considerations for Evolving Attack Methods

One thing is clear: no one is safe from ransomware attacks.

Blog Image

NFL Draft: 5 Things Teams Need to Do Now to Guard Against Hackers

Ready or not, it’s NFL draft week. After much debate over how to hold the NFL draft, teams are now on the clock as they prepare for a draft like none before. However, as the league and teams have worked to build out a virtual draft infrastructure that relies on technology like Zoom or Microsoft Teams, many are more vulnerable to hackers than they realize.

Following are 5 tips to tighten security protocols that teams need to implement now:

Blog Image

CRITICALSTART’s TEAMARES a Top Contributor to Folding@Home in Global Fight Against COVID-19

In times like these, we all could use some good news and CRITICALSTART‘s TEAM

Blog Image

Cybersecurity Needs for the Remote Workforce

Chicken Little was always running around saying the same thing… until it really happened… and then no one believed him.

Blog Image

Free MOBILESOC and Endpoint Protection for Remote Security Teams until June 15

Like many other organizations, we have deliberated on how CRITICALSTART can contribute to the safety and well-being of the broader community, not just our customers and employees.   

Blog Image

Hard-Coded Administrator Password Discovered in OpsRamp Gateway

Version Tested:
3.0.0

Product:
https://www.opsramp.com/

CVE Numbers:
CVE-2020-11543

CVSS Score:
10.0 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Blog Image

Vulnerabilities Discovered in CIPAce Enterprise Platform

Versions Tested:
CIPAce Version < 6.80 Build 2016031401
CIPAce Version < 9.1 Build 2019092801