Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Types of Cyber Attacks To Look Out For

This blog is going to be short and sweet, but informative for anyone that is new to the cyber field or needs a recap.

Read More

SecurityCenter – Speedier Remediating

A Verizon Data Breach Report release always brings with it a wealth of information regarding industry trends towards the discovery of vulnerabilities and how fast organisations are able to act once they have been discovered; and this year is no different.

Read More

An Introduction To Automatic Transfer Systems (ATS)

A fairly new and unfamiliar technique used by banking malware is Automatic Transfer Systems. This type of malware harvests financial information such as login credentials to bank websites. A couple of ways that this can be achieved is by Formgrabbing and Webinjection. I’ll give a brief overview of what these two types of malicious activity entails.

Read More

NHS Needs “Massive” Investment In Cybersecurity Warn Experts

Early May NHS bosses and government faced questions over why their hospitals were left vulnerable to global cyber-attack “wannacry”. NHS faced days of disarray after the attackers demanding a ransom intruded the health services computer systems.

Read More

Variants OF Petya Ransomware Spreading With EternalBlue

It has been reported that variants of Petya ransomware with worm-like capabilities is spreading. The ransomware leverages etenalblue exploit, genuine psexec or wmic with appropriate credentials for a quick spread.

Read More

Your KPI's At Work: Assurance Report Cards in SecurityCenter

One of the requests I get most often when discussing Vulnerability Management with our customers is how to properly track KPIs, SLAs and other business metrics. Most of us have to adhere to some kind of governance or tracking to ensure we meet our targets for discovery or remediation when it comes to vulnerabilities.

Read More

Tenable SecurityCenter & Thycotic Secret Server: Enterprise Class Scan Credential Management

If you are a Security Center user, you’ll be pleased to hear that Tenable have integrated on-demand credential retrieval from Thycotics flagship PAM product, Secret Server!

Read More

Ransomware... One More Time

Following on from the previous blog “Carbon Black (CB) “More on WannaCry” I thought it would be a good idea to go over Ransomware and list some key information surrounding this type of malware. (Would have been an idea to write this before the last blog but needs must be met when everyone is talking about one specific type) So for you guys that are still unsure how Ransomware works here goes. (Warning: This maybe too basic for most but awareness is key ☺)

Read More

Satisnet at InfoSecurity Europe 2017

So InfoSecurity Europe 2017 is over and it’s certain that London Olympia was once again packed with cyber security professionals and there was more invaluable content across the stages and throughout the show!

Read More

Five Valuable Tips to Take-Away For Ransomware Protection

The way that WannaCry spreads is by SMB using a vulnerability found within Microsoft Windows. Microsoft addressed the vulnerabiolity by releasing a new patch with the reference name of MS17-010 back in March. Organisations still had not updated their systems, and therefore had been exploited via the weakness in their defences. Once it infects the network, WannaCry encrypts all files it has access to and attempts to delete all shadow copies, making affected files even more difficult to recover.

Read More

Pages