Blogs

Blog Image

Cybersecurity Needs for the Remote Workforce

Chicken Little was always running around saying the same thing… until it really happened… and then no one believed him.

Blog Image

Free MOBILESOC and Endpoint Protection for Remote Security Teams until June 15

Like many other organizations, we have deliberated on how CRITICALSTART can contribute to the safety and well-being of the broader community, not just our customers and employees.   

Blog Image

Hard-Coded Administrator Password Discovered in OpsRamp Gateway

Version Tested:
3.0.0

Product:
https://www.opsramp.com/

CVE Numbers:
CVE-2020-11543

CVSS Score:
10.0 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Blog Image

Vulnerabilities Discovered in CIPAce Enterprise Platform

Versions Tested:
CIPAce Version < 6.80 Build 2016031401
CIPAce Version < 9.1 Build 2019092801

Blog Image

From the Trenches: Relaying Passwords for the Win!

As pentesters and red teamers, we know that it isn’t hard to get user passwords. The real challenge can be getting an elevated user such as Domain Admin (DA) or Enterprise Admin (EA), especially if you want to try bypassing any type of security auditing, such as the addition of a user to a privileged domain group.

Blog Image

Telesploit: Open-Source Remote Vulnerability Assessment & Penetration Testing

Due to current events, your organization is more than likely experiencing disruption resulting from a rush to implement remote work policies, socia

Blog Image

The Best Online Security Courses to Take in Your Downtime

With the daily routines of millions rapidly changing as we settle into a period of social distancing, many are looking for ways to pass the time once their reading lists

Blog Image

Phishing Attacks: Beware of Online Financial Scams

Challenging times bring out the best in people – but also the worst.

Blog Image

CRITICALSTART’s TEAMARES Research Is Aiding Global Fight Against COVID-19

What does a computer virus have in common with the Coronavirus (COVID-19)? Plenty, believe it or not, as technology can be used to help solve both.

Blog Image

Regex Revelry

Regular Expressions (Regex) are used to identify strings that defy simple search terms, which infosec and technology professionals use for things like input validation, sea