Privilege Escalation and Home Office

Privilege Escalation and Home Office

Working from home may reveal the flaws of applications and processes in use so double-checking the access controls and privilege escalation possibility is highly recommended. Web applications are more popular than ever, people prefer working remotely from home instead...
The applications that we deliver are safe and secure!

The applications that we deliver are safe and secure!

What would happen if a deadline was approaching and it suddenly turned out that principal safety regulations have not been met, and the hardware components have well documented vulnerabilities that are easy to exploit? Most likely the entire project would need to be...
We use no WiFi, thus we’ve hedged against being hacked for sure!

We use no WiFi, thus we’ve hedged against being hacked for sure!

When employees demand wireless coverage in the office, they mean it. A lack of WiFi coverage monitoring within the business quarters could lead to a tangle of rogue access points installed by employees throughout the building. Or, even worse, staff could connect to...
If our systems had been hacked we would surely know about it

If our systems had been hacked we would surely know about it

The truth is that a talented enough hacker would leave hardly any noticable trail. In fact, malicious attackers could come and go at ease at the borders of the corporate network, reconfigure services and open backdoors for ease of passage, and may even manage to...