Blog
January 12, 2022
Advisory on log4Shell VMWare Horizon
Introduction If you have VMWare Horizon in your organization, this message may be very important for you to secure your IT infrastructure. Your organization can be penetrated and hacked at any time. We analyzed a successful exploitation of the “Log4shell” vulnerability CVE-2021-44228 on a VMWare Horizon component: Blast Secure Gateway.
Category :
Blog ,
News & Media
September 14, 2021
Partenariat avec l’IDEC et lancement de la formation ICT CYBERSECURITY SPECIALIST AVEC BREVET FÉDÉRAL
Les attaques informatiques toujours plus élaborées ne cessent d’accroître le besoin de professionnels hautement qualifiés, capables de mettre en place la protection préventive adaptée à chaque système d’information. Quelle que soit leur taille, toutes les organisations doivent pouvoir compter sur des spécialistes en sécurité informatique capables de surveiller l’évolution rapide
Category :
Blog ,
News & Media
September 6, 2021
Microsoft Defender for Endpoint P1 and P2 options
Microsoft recently announced the upcoming availability of Microsoft Defender for Endpoint P1 and P2 options. Those options are replacing the full version, available as a standalone SKU or bundled in E5 licenses. Although not complete and not offering the hunting capabilities of the P2 license, the P1 one, included for
Category :
Blog ,
Internal ,
News & Media
August 24, 2021
Three Ways To Improve Business Email Security In Office 365
Emails remain one of the most popular and widely used communication tools in the business. According to one recent estimate, there are four billion email users as of 2020. Unfortunately, hackers also know that companies run on email, and that is why they have naturally developed a variety of techniques
Category :
Blog ,
Internal
June 8, 2021
The Importance of an Incident Response Plan
The diversity of cyber-attacks keeps growing and getting more complicated to deal with, and their impacts are increasingly disruptive and damaging. To deal with these changes and maintain the system’s security, businesses must be prepared and establish a strong incident response plan. Being prepared to face an attack is the
Category :
Blog ,
Internal
May 2, 2021
Azure Blob Storage: detect and prevent public accesses
Introduction Azure StorageAccount is Microsoft solution to regroup its offerings for storage solution in the cloud. There are four types of solutions: Blob : objects storage, similar to AWS s3 File : file share in the cloud Table : NoSQL in the cloud Queue : messages queue “Wait, similar to
Category :
Blog
April 7, 2021
Hacknowledge Interviewed from Silicon Luxembourg Magazine
Silicon Luxembourg magazine recently interviewed Barbara Terra, Sales Director of our Luxembourg subsidiary, for its April issue. “Offensive, Defensive and Incident response” is our motto. In this article, Barbara Terra explains the importance of each step in protecting our customers from cybercriminals. Now more than ever, cybersecurity is undeniably important.
Category :
Blog ,
News & Media
March 16, 2021
Stronger Together : We are now a Technology Alliance Partner (TAP) and Professional Services Qualified of Splunk
We are proud to announce that Hacknowledge is now an official partner of Splunk. Our goal is to be able to offer the same quality of service for customers using Splunk. The new Analytics Division of Hacknowledge has recently been awarded by three Splunk Certified Consultants and many Splunk accreditations,
Category :
Blog ,
News & Media
March 8, 2021
Hacknowledge will be platinum sponsor of the Swiss Cyber Security Day 2021 conference (https://swisscybersecuritydays.ch).
The Swiss Cyber Security Days will take place Online, the 10 and 11th of March 2021. This year, due to the pandemic situation, the event will be entirely online You will have the opportunity to hear 2 conferences from us : 10/03 at 13h00 – Best Practice B-06 ST: A
Category :
Blog ,
News & Media
February 22, 2021
Supply Chain Attacks: Risk and Best Mitigation Practices
The Basics of Supply Chain Attacks Supply chain attacks are an ever growing threat to organizations and enterprises. A supply chain is usually insufficiently monitored. Elements of a supply chain include third-party software used to interface with enterprise software, open source platforms, cloud services, past and present suppliers and vendors
Category :
Blog ,
News & Media