Blog

January 12, 2022

Advisory on log4Shell VMWare Horizon

Introduction If you have VMWare Horizon in your organization, this message may be very important for you to secure your IT infrastructure. Your organization can be penetrated and hacked at any time. We analyzed a successful exploitation of the “Log4shell” vulnerability CVE-2021-44228 on a VMWare Horizon component: Blast Secure Gateway.
Read More
September 14, 2021

Partenariat avec l’IDEC et lancement de la formation ICT CYBERSECURITY SPECIALIST AVEC BREVET FÉDÉRAL

Les attaques informatiques toujours plus élaborées ne cessent d’accroître le besoin de professionnels hautement qualifiés, capables de mettre en place la protection préventive adaptée à chaque système d’information. Quelle que soit leur taille, toutes les organisations doivent pouvoir compter sur des spécialistes en sécurité informatique capables de surveiller l’évolution rapide
Read More
September 6, 2021

Microsoft Defender for Endpoint P1 and P2 options

Microsoft recently announced the upcoming availability of Microsoft Defender for Endpoint P1 and P2 options. Those options are replacing the full version, available as a standalone SKU or bundled in E5 licenses. Although not complete and not offering the hunting capabilities of the P2 license, the P1 one, included for
Read More
August 24, 2021

Three Ways To Improve Business Email Security In Office 365

Emails remain one of the most popular and widely used communication tools in the business. According to one recent estimate, there are four billion email users as of 2020. Unfortunately, hackers also know that companies run on email, and that is why they have naturally developed a variety of techniques
Read More
June 8, 2021

The Importance of an Incident Response Plan

The diversity of cyber-attacks keeps growing and getting more complicated to deal with, and their impacts are increasingly disruptive and damaging. To deal with these changes and maintain the system’s security, businesses must be prepared and establish a strong incident response plan. Being prepared to face an attack is the
Read More
May 2, 2021

Azure Blob Storage: detect and prevent public accesses

Introduction Azure StorageAccount is Microsoft solution to regroup its offerings for storage solution in the cloud. There are four types of solutions: Blob : objects storage, similar to AWS s3 File : file share in the cloud Table : NoSQL in the cloud Queue : messages queue “Wait, similar to
Read More
April 7, 2021

Hacknowledge Interviewed from Silicon Luxembourg Magazine

Silicon Luxembourg magazine recently interviewed Barbara Terra, Sales Director of our Luxembourg subsidiary, for its April issue.  “Offensive, Defensive and Incident response” is our motto. In this article, Barbara Terra explains the importance of each step in protecting our customers from cybercriminals. Now more than ever, cybersecurity is undeniably important. 
Read More
March 16, 2021

Stronger Together : We are now a Technology Alliance Partner (TAP) and Professional Services Qualified of Splunk

We are proud to announce that Hacknowledge is now an official partner of Splunk. Our goal is to be able to offer the same quality of service for customers using Splunk. The new Analytics Division of Hacknowledge has recently been awarded by three Splunk Certified Consultants and many Splunk accreditations,
Read More
March 8, 2021

Hacknowledge will be platinum sponsor of the Swiss Cyber Security Day 2021 conference (https://swisscybersecuritydays.ch).  

The Swiss Cyber Security Days will take place Online, the 10 and 11th of March 2021. This year, due to the pandemic situation, the event will be entirely online You will have the opportunity to hear 2 conferences from us : 10/03 at 13h00 – Best Practice B-06 ST: A
Read More
February 22, 2021

Supply Chain Attacks: Risk and Best Mitigation Practices

The Basics of Supply Chain Attacks Supply chain attacks are an ever growing threat to organizations and enterprises. A supply chain is usually insufficiently monitored. Elements of a supply chain include third-party software used to interface with enterprise software, open source platforms, cloud services, past and present suppliers and vendors
Read More
Emergency