Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Free Tools: Secure Password Generator

There’s many a time you’re required to come up with a secure password at short notice, and there are many tools to do this. There is a vendor in firmly entrenched in the password security market who has made a powerful yet flexible password generator that also guarantees the privacy of your newly generated password.

Read More

New Memory bug for Apache servers - Optionsbleed

These days’ hackers are trying to find persistence way of hacking the web application and the web server, now apache servers that are a bit older versions are a recent hit in terms of vulnerabilities.

Read More

QRadar User Behavioural Analytics App (UBA) version 2.2.0

With the development of the UBA App Extension, IBM is providing a very useful method of exposing a wide variety of user activities that may be fraudulent or malicious.

Read More

QRadar Use Case Series: Part 3: Data Exfiltration Attempt Through Online Storage

Welcome back to the IBM QRadar use case series. I am going to give ‘User Activity Monitoring’ a break for some time and focus this particular post on ‘File Activity Monitoring’. Although, not that dissimilar, we are identifying trends around directories and in particular files.

Read More

The KRACK Wi-Fi Security Weakness

Security researches this week discovered a serious vulnerability in WPA2, WPA2 (short for Wi-Fi Protected Access II) is a security standard that secures all modern protected Wi-Fi networks. Mathy Vanhoef of imec-DistriNet discovered and published a flow in WPA2 that allows anyone to break this protocol and intercept data communicating between your wireless device and the wifi network. This could be your photos, passwords, messages and so forth.

Read More

QRadar Technical Blog: HA and DR

People often question whether to use High Availability (HA) or Disaster Recovery (DR). In our view this is not really a valid question. The two techniques address different issues and probably the choice of “HA or DR” should be re-defined as “HA and DR”.

Read More

Protect your crown jewels – hardening access to Thycotic Secret Server

So, you have invested time and resource into Thycotic’s flagship product, Secret Server, in the understanding that all your privilege account information is secretly buried away, highly encrypted in a highly available MS-SQL cluster, redundant across all 5 continents.

Read More

A brief point on double standards…

Whilst trawling the internet for the topic for a blog I came across a fascinating POC attack for a method in which a user could payload Microsoft excel/word documents without the use of a macro. This exploited an inbuilt MS office suite utility in order to run commands on an end-user machine.

Read More

Netflix Scan Emails

Netflix is a popular online movie streaming platform where millions of users take the benefit of this service. As we know the online scam is transforming into a complex stage where it’s hard to believe on company emails that comes in the inboxes.

Read More

An Introduction to the ELKeBMWSC(Tn) Stack

ELK Stack is currently the preferred stack of software for DIY logging. It has been compared to the likes of Splunk, offering the incentive of being open-source. The ELK Stack is initially composed of three software packs: Elasticsearch, Logstash & Kibana.

Read More

Pages