Blogs

Cybersecurity Needs for the Remote Workforce

Chicken Little was always running around saying the same thing… until it really happened… and then no one believed him.

Free MOBILESOC and Endpoint Protection for Remote Security Teams until June 15
Like many other organizations, we have deliberated on how CRITICALSTART can contribute to the safety and well-being of the broader community, not just our customers and employees.

Hard-Coded Administrator Password Discovered in OpsRamp Gateway
Version Tested:
3.0.0
Product:
https://www.opsramp.com/
CVE Numbers:
CVE-2020-11543
CVSS Score:
10.0 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerabilities Discovered in CIPAce Enterprise Platform

Versions Tested:
CIPAce Version < 6.80 Build 2016031401
CIPAce Version < 9.1 Build 2019092801

From the Trenches: Relaying Passwords for the Win!
As pentesters and red teamers, we know that it isn’t hard to get user passwords. The real challenge can be getting an elevated user such as Domain Admin (DA) or Enterprise Admin (EA), especially if you want to try bypassing any type of security auditing, such as the addition of a user to a privileged domain group.

Telesploit: Open-Source Remote Vulnerability Assessment & Penetration Testing

Due to current events, your organization is more than likely experiencing disruption resulting from a rush to implement remote work policies, socia

Authentication Bypass Vulnerability Discovered in Infinias eIDC32 WebServer
Versions Tested:
Web Revision: 1.107, Board: 3.001, Firmware: 2.213

The Best Online Security Courses to Take in Your Downtime

With the daily routines of millions rapidly changing as we settle into a period of social distancing, many are looking for ways to pass the time once their reading lists

Phishing Attacks: Beware of Online Financial Scams

Challenging times bring out the best in people – but also the worst.

CRITICALSTART’s TEAMARES Research Is Aiding Global Fight Against COVID-19
What does a computer virus have in common with the Coronavirus (COVID-19)? Plenty, believe it or not, as technology can be used to help solve both.

Regex Revelry

Regular Expressions (Regex) are used to identify strings that defy simple search terms, which infosec and technology professionals use for things like input validation, sea

Vulnerabilities Discovered in Tiff Server from AquaForest

Versions Tested:
Tiff Server 4.0