Articles by
Cyber Security Associates
- Cyber Security Associates
- August 2, 2023
When it comes to the Payment Card Industry Data Security Standard (PCI DSS), there are common mistakes that every QSA...
- Cyber Security Associates
- July 20, 2023
Pentesting Keycloak – Part 2 This is part 2/2 of “Pentesting Keycloak”, this section will cover:
- Cyber Security Associates
- July 14, 2023
Just over 18 months ago, Cyber Security Associates Limited (CSA) took the decision to use the Microsoft Security stack...
- Cyber Security Associates
- July 4, 2023
What is Keycloak? Keycloak is an open-source Identity and Access Management (IAM) solution. It allows easy...
- Cyber Security Associates
- June 22, 2023
Trying to stay fully compliant today can be like trying to hit a moving target. The regulatory landscape is now...
- Cyber Security Associates
- June 18, 2023
SentinelOne Managed Security Service Prodiver (MSSP) Cyber Security Associates has partnered with SentinelOne to...
- Cyber Security Associates
- June 6, 2023
What is it? CVE-2021-44228, also known as Log4Shell, is a remote code execution (RCE) vulnerability affecting Apache...
- Cyber Security Associates
- April 19, 2023
In a recent online briefing, SureCloud’s Risk Advisory Senior Director, Craig Moores, sat down with Senior Consultant...
- Cyber Security Associates
- April 11, 2023
Jitsi-Meet Authentication Bypass (CVE-2021-33506) At CSA, one of our most vital services is penetration testing. We...
- Cyber Security Associates
- February 15, 2023
For some years now, geopolitical conflicts have been as much about bits and bytes as they have boots and bullets. The...
- Cyber Security Associates
- February 15, 2023
What is it? WPwnKit, discovered by the Qualys Research Team, is a local privilege escalation vulnerability affecting a...
- Cyber Security Associates
- January 17, 2023
Executive Summary Although the ongoing war between Russia and Ukraine is well known since the invasion in February...
