Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Adobe and Microsoft discover critical vulnerability gaps

Microsoft and Adobe released patches this Tuesday to patch critical security vulnerabilities in their products. Patch released by Microsoft fixes near 80 security issues in variety of its Windows operating systems and its associated software’s. The patch included a fix for 2 vulnerabilities which is already being exploited by the attackers.

Read More

Enrich X-Force threat intelligence reports with additional 3rd party sources

The right click X-Force feature on QRadar is limited to only X-Force reports. You can further enrich the information on X-Force exchange by integrating 3rd party threat intelligence sources.

Read More

Threat Report

This week’s blog covers this month’s threats, trends and insights over a few categories: Malware, Spam, Web attacks, Phishing, Mobile & Social Media.

Read More

Bitcoin - Accepting Merchants' Cookies Threaten User Anonymity

Researchers from Princeton University have released their findings on how online ad trackers can impact the privacy of cryptocurrency transactions.

Read More

Improving Scans With Assets In SecurityCenter

Assets within SecurityCenter are one of the more powerful objects that can be used, but I often discover when working with my customers that they are ignored or at most, misunderstood.

Read More

Help With Preventing Unexpected Website Infections

Gambling, porn, gaming and video streaming sites are the most frequent targets. You’ve probably dealt with these kinds of sites yourself. You visit a torrenting page, click on a link, and then 2-3 browser windows will pop-up in the background.

Read More

Is Prevention Better Than Remediation?

Absolutely. I want to open discussion around Zero Day attacks. More specifically - how to best prepare for one.

Read More

The Problem's with Current Learning Management Systems

In this article, I'd like to look at how we're currently issuing training to end users. More specifically - I'd like to look at some of the common problems I regularly hear CISO's/CDIO's/CIO's talk about when it comes to training end users. Whether the topic of training is threat awareness or new company policies - there are still many flaws between the content that gets created in order to teach and that content reaching the end user.

Read More

The Importance of End User Awareness

With GDPR less than a year away, are we all preparing as best we can? GDPR shouldn't be mentioned with the tone of it only affecting members of board, CIO's/CTO's/controllers and processors. When we talk about GDPR - we should be looking at both ends of the spectrum. End users play a huge part in the general data protection regulation cycle.

Read More

UACMe – Bypass Windows User Account Control (UAC)

These days bypassing user security controls is one of the desired steps for hackers. UACme is a compiled, C-based tool which contains a number of methods to defeat Windows User Account Control mostly known as UAC. It misuses the built-in Windows AutoElevate backdoor and contains 41 techniques.

Read More

Pages