fbpx

This website uses cookies to ensure you get the best experience. More Information...

SECURITY LABS

Azure Case Study
Azure Case Study

Download Full Case Study The Azure Trend During the keynote day 2 of Microsoft Build 2016, Executive VP of Cloud & Enterprise division, Scott Guthrie, revealed some outstanding metrics related to the roll-out of Microsoft Azure to the current IT landscape. MS is growing at a rate of 120k new customers per month. There are […]

READ MORE
Integrating People, Process and Technology
Integrating People, Process and Technology

Download the White Paper The state of information security requires a continuous process of awareness, preparedness and readiness. It is a highly demanding, cross-domain activity that covers nearly all aspects of an organization and involves resources with different skills and levels of expertise. It is not a fixed cost nor a fixed duration project but […]

READ MORE
EU Horizon 2020 Project “GHOST: Safe-Guarding Home Internet of Things (IoT) Environments”
EU Horizon 2020 Project “GHOST: Safe-Guarding Home Internet of Things (IoT) Environments”

Obrela Security Industries participates in the consortium along with other EU organizations on an effort to provide a transparent cybersecurity environment on the European IoT “Smart Home” market. GHOST is set to tackle the complex cyber-security and privacy challenges of the modern digital home. The project aims to develop a solution using the most sophisticated technologies […]

READ MORE
EU Horizon 2020 Project “FORTIKA – Cyber Security Accelerator for trusted SMEs IT Ecosystems”
EU Horizon 2020 Project “FORTIKA – Cyber Security Accelerator for trusted SMEs IT Ecosystems”

The project’s vision is to offer a holistic, custom and adjustable cyber security solution to SMEs. Obrelas’ role is to help in the research and development of a solution that would minimize the exposure of small and medium sized businesses to cyber security risks and threats as well as to help them respond successfully to cyber […]

READ MORE
When and where cyber security took a wrong turn? And how you can regain control of your company’s security posture
When and where cyber security took a wrong turn? And how you can regain control of your company’s security posture

by Ian Cook The cyber security industry appears to be struggling to keep pace with a seemingly never-ending stream of new vulnerabilities exposing organisations to ransomware attacks, corporate espionage and worse. Trade shows such as InfoSecurity Europe 2017 host hundreds of new “off-the-shelf solutions” that claim to provide cybersecurity at a stroke. The million dollar […]

READ MORE
Hewlett Packard Enterprise (HPE) Worldwide Case Study about Obrela
Hewlett Packard Enterprise (HPE) Worldwide Case Study about Obrela

Today’s vendor driven approach to cybersecurity which continues to add more and more layers, is not sustainable. With a mathematical certainty every security model will inevitably fail at least once, regardless of the defense and technology sophistication involved.   Although they have invested in the latest technology, organizations – still – cannot detect cyber threats […]

READ MORE
WannaCrypt ransomware attack

We would like to make you aware of a new ransomware that has been spread since 12th of March worldwide affecting hundreds of thousands of Windows computers and for which you should be considering the application of an emergency security patch update that Microsoft has released few hours ago. The ransomware is called WannaCrypt and […]

READ MORE
Undetectable Metasploit WAR

A possible attack path during a penetration test is having access to the administrative console of a JAVA Application Server (like WAS, JBOSS and Tomcat) installed on a Windows server with default or guessable (e.g. through brute-force) administrative credentials. The idea was to upload a Metasploit generated WAR application in order to successfully compromise the […]

READ MORE
Fast Forward Brute-Forcing Apache Tomcat 6/7/8

Intro Apache Tomcat web administrative interface often stands as a primary target during a Penetration Test due to its promising potential in case of compromise. That is why, Tomcat 6 (and above versions) implements – by default – an “anti-bruteforcing” security mechanism (LockOutRealm*). While experimenting with this feature, I’ve identified a way around that improves […]

READ MORE