Insights

This is where we share our expertise, thoughts and advice.

Cybersecurity challenges for SMEs

Faced with increasing risks associated with IT systems, the protection of personal data and information systems has become a strategic priority. In this article, we will address the major cybersecurity challenges for businesses and propose concrete strategies to overcome them.

Hadooken: A Linux Malware Targeting Oracle WebLogic Servers

Aqua Nautilus researchers identified a new Linux malware targeting Weblogic servers. The main payload calls itself Hadooken, a potential reference to the Hadouken attack (or “surge fist”) in the Street Fighter video game series. When Hadooken is executed, it drops a Tsunami malware and deploys a cryptominer. In this article, we explain the malware, its components, and how it was detected.

Exploring Industrial Cybersecurity Challenges

The evolution of the Industrial Revolution, from mechanization in the 18th century to today’s Industry 4.0, has brought about significant advancements in technology and productivity. Industry 4.0 is characterized by connected factories and cyber-physical systems leveraging the industrial Internet of things (IIoT), artificial intelligence (AI), and big data to optimize processes in real time and enable innovations like predictive maintenance and remote management. However, this increased connectivity and complexity also heightens the risk of cyberattacks, which can jeopardize data integrity, system availability, and safety, potentially causing severe disruptions to industrial operations and compromising personal safety.

Everything you need to know about malware

In 2023, 6.06 billion malware attacks were detected globally. The most commonly blocked types of malware were worms, viruses, ransomware, and trojans. Phishing attacks, primarily delivered through e-mail and websites, continue to incur significant costs for both individuals and enterprises.
Learn everything you need to know about malware in this article.

Why you should run pen tests no matter your organization size

Every company, no matter its size, has digital assets, tools, and resources that need protection.

Developing a cybersecurity plan, implementing protective measures, and documenting procedures are essential steps for safeguarding assets. However, only the penetration test provides a concrete assessment of vulnerabilities and immediate insights into cyber risks and threats.
Learn why you should run pen tests no matter your organization size :

Global Microsoft/Crowdstrike IT Outage Cripples Many Businesses

The Crowdstrike outage is historical. Millions of workstations are crashing, around the world. Around 70% of Fortune 100 companies are affected.

The global outage grounded flights and knocked banks, hospital systems and media outlets offline.

We can provide immediate support to address any current vulnerabilities and work towards a swift recovery for your affected systems.

A new ransomware promises to be El Dorado for cybercriminals

The new Eldorado ransomware targets Windows and VMware ESXi systems, with sixteen victims primarily in the United States across various industries. Groupe-IB researchers observed Eldorado’s activities and announced the threat on RAMP forums. This ransomware uses the ChaCha20 algorithm for encryption and generates unique keys for each locked file.
How can you protect against ransomware? Learn more in the article.

The regression vulnerability in OpenSSH: a threat to enterprise security

A serious vulnerability has been found in OpenSSH on glibc-based Linux systems, which represents an important security risk that might impact your organization and millions of organizations, with now, exposed OpenSSH servers.
Contact us for a thorough assessment and tailored security solutions.