Skip to content

Blog

Offensive Security: Is Penetration Testing or Red Teaming right for you?

Cyber security and cyber threats have a history spanning over half a century, beginning with the development of secure...

Get ahead of PCI DSS 4.0.1 with continuous compliance

As further changes to the Payment Card Industry Data Security Standard (PCI DSS) come into force by March 31st 2025,...

PCI DSS: SAQ A – Changes Announced

Last Thursday, The PCI Council released an update to Self-Assessment Questionnaire (SAQ) A.

Working from Home? 5 Steps to Secure Your Home Network

Introduction With a large amount of confidential and/or proprietary information residing on and flowing through a...

Implementing a Fine-grained Password Policy for Domain Admins

Introduction With ever more integration of applications and systems into Active Directory, hardening the security of a...

Unauthenticated RCE on all GNU/Linux system – Should you be concerned?

Introduction On September 26th an Italian security researcher released details regarding an unauthenticated remote...

iRedAdmin Multiple Vulnerabilities – CVE-2024-47227

TL;DR CSA identified multiple vulnerabilities within iRedAdmin <= 2.5 which are tracked under CVE-2024-47227. iRedAdmin...

Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)

Overview In recent July Patch Tuesday Microsoft patched a vulnerability in the Microsoft Kernel driver appid.sys, which...

Why Red Teaming Should be an Essential Pillar of your Organization’s Cybersecurity Strategy

The financial and reputational damage caused by a cyberattack can be devastating for governments and organizations....

DORA: The Digital Operational Resilience Act

What is DORA? The Digital Operational Resilience Act is a European framework that establishes a uniform approach...

How CSA Empowers Organizations in Transitioning to PCI DSS Version 4 Compliance

It’s time for your organization to take action and transition to PCI DSS v4.0 Compliance. The Payment Card Industry...

Microsoft announces solution to detect suspicious processes running on hidden desktops

Overview With remote desktop protocol (RDP) compromises on the rise, Microsoft Defender for Endpoint has introduced a...