Obrela Security Industries

WE KEEP YOUR BUSINESS IN BUSINESS

We manage cyber exposure, risks and compliance. We identify, predict and prevent cyber threats, in real time. As a service, personalized, on demand.
Read More
CYBERSECURITY AS A SERVICE
SWORDFISH
TECHNOLOGY
Real time risk management
Read More
FROM SECURITY LABS
Threat Intelligence Report - Infographic 2017

Over 2017 we collected and analyzed an immense amount of information, from multiple, diverse data sources and geographic locations globally, generating valuable intelligence for new, emerging and advanced security threats giving our clients a unique advantage in predictability, preparation and response.

READ MORE
Bypassing insufficient blacklisting

Operating system (OS) command injection attack is a variant of code injection attacks which are considered a major security threat that in fact, is classified as No. 1 on the 2013 OWASP top ten web security risks [1]. The main objective of this article is to examine the detection and exploitation capabilities of Commix against blacklisting techniques. The general idea behind blacklisting is to check for malicious patterns before allowing the execution of users input.

READ MORE
IBM WebSphere Java Deserialization (RCE) - Metasploit Module

Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.

READ MORE
View all entries
NEWS
CyberSecurity is failing its customers

A more holistic approach must be taken to deploy digital technologies effectively. Integrated cyber-risk management is all about integrating people, process and technology while managing risks in real time.

READ MORE
Evolving technologies will allow managing cyber risk (rather than threat)

Buying in cyber-risk-management-as-a-service will let companies manage cyber-risk like any other risk, achieving visibility, incorporating cyber-security into the core of product and service design plus facilitating cyber-insurance.

READ MORE
Infosec 2018 | Panel Discussion - Improving Security & Data Breach Response

How are CISOs staying on top of the latest cyber threats? Where should enterprises be investing their cybersecurity budgets? What should you do in the event of a data breach? Get the tactical insights on how to protect your organization before, during, and after a data breach. Join top security experts to get the answer to these questions

READ MORE
View all entries