Search results
Nixu Corporation
Press release on March 27, 2019 at 14:05 EET
Nixu Corporation
Press release on March 27, 2019 at 15:35 EET
Last March there were a couple of interesting vulnerability disclosures that merit a closer look from a disclosure point of view.
Nixu Corporation
Press release on March 28, 2019 at 12:05 EET
Nixu Corporation
Press release, April 1, 2019 at 14.25 EEST
The first blog post of the series – ‘CISO Says…YES’ raises the topic of security departments that are perceived as the ‘Department of NO.’ And how information security management services can be utilized to get a grip on an organization's current state of information security,
Bug bounty programs are growing in popularity worldwide. But what are they really about? Can anyone become a bug bounty hunter? Cybersecurity consultant by day, bounty hunter by night – Nixu’s cybersecurity expert Tomi lets us in on the secrets of bug bounty hunting.
This post continues on the theme that began in yesterday's post: Implementing cost-effective cyber security (part 1).
Many of us recognize the situation of having to explain how to identify and respond to phishing to the not-that-techy-ones. Here's a post and a PDF that you can forward to whoever might need it!
Gunnar had no idea of the consequences of clicking a seductive bookkeeping system ad. A busy day at the office turned into a defensive battle at the headquarters of a Swedish manufacturing company. An advanced spear phishing attack in several stages didn’t hurt only the company but their partner as well.
Nixu Corporation
Press release on April 16, 2019 at 9.05 AM EEST
Cyber security and cyber defence are massive-sounding terms and ones that we are likely to connect with critical infrastructure and national-level operators. For many smaller operators cyber defence sounds foreign and even unnecessary.
The Industrial Internet of Things (IIoT) is gaining a stronger foothold as a solution for industrial environments. Some industrial facilities have been using IIoT or similar techniques for more than a decade—longer than the term itself has existed. However, information security has failed to keep abreast with the technological advances in industrial environments.
It's common in industrial enterprises that the factory and even some of its production systems have existed long before their information security has even been discussed.
Nixu Corporation
Press release, April 26, 2019 at 10 AM EEST
We cannot know for sure what goes on at Norsk Hydro and how they have proceeded in their process. But who doesn’t enjoy good old speculation.
People are increasingly relying on IoT-devices, without realizing that these gadgets can cause consumers to be extremely vulnerable to security breaches. In 2012 Mattijs van Ommeren, Principal Security Consultant at Nixu, illustrated that many vulnerabilities could be demonstrated in Network Attached Storage devices (NAS).
In this article, André Ahlfors Dahl describes how to create mask files for Hashcat with a UTF-8 multibyte character set.
Cybersecurity risks are a result of three elements: threat, vulnerability, and impact. This blog specifically addresses vulnerability management. Patching is an important aspect of this, but there is more to it than meets the eye. As always in information security we have to balance the risk and the cost.