News & Resources
New USB Tool Released by Microsoft to Fix CrowdStrike Falcon Agent Issue
In response to the recent incident involving the CrowdStrike Falcon agent, which caused widespread Blue Screen of Death (BSOD) errors on Windows clients and servers, Microsoft has released a new USB tool to help IT administrators expedite the repair process. This new...
Clarification on CrowdStrike Incident: Understanding the Real Cause of Windows Crashes
In recent days, a significant number of Windows users have experienced the dreaded Blue Screen of Death (BSOD) on their devices. While initial reactions and some misinformation pointed fingers at Microsoft, it is crucial to clarify that these issues are not related to...
CrowdStrike Update Causes Widespread Windows Crashes: A Crisis Unfolds
In a significant security incident, infosec vendor CrowdStrike has rolled out an update that is causing widespread crashes and rendering Windows machines inoperable. Users around the globe have reported that their Windows 10 PCs are encountering the notorious Blue...
Critical CVE-2024-38021 Vulnerability in Microsoft Outlook: Risks and Mitigation Strategies
Researchers have recently identified a critical vulnerability in Microsoft Outlook, designated as CVE-2024-38021. This zero-click remote code execution (RCE) vulnerability represents a significant security risk, affecting most Microsoft Outlook applications. Unlike...
Network Security Engineer to Security Automation Developer: The Future
In the rapidly evolving landscape of cybersecurity, the role of a Network Security Engineer is undergoing a significant transformation. As organizations increasingly rely on complex and interconnected systems, the need for robust and adaptive security measures has...
CVE-2024-6387: Critical ‘regreSSHion’ Flaw Exposes Millions of Linux Systems to Unauthenticated RCE
The Qualys Threat Research Unit (TRU) has discovered a vulnerability that leaves millions of glibc-based Linux systems exposed to remote code execution (RCE). This flaw marks the first OpenSSH vulnerability in nearly two decades that allows unauthenticated remote code...
Get Started
Contact us and start your cyber security journey with us.