fbpx

This website uses cookies to ensure you get the best experience. More Information...

SECURITY LABS

EU Horizon 2020 Project “FORTIKA – Cyber Security Accelerator for trusted SMEs IT Ecosystems”
EU Horizon 2020 Project “FORTIKA – Cyber Security Accelerator for trusted SMEs IT Ecosystems”

The project’s vision is to offer a holistic, custom and adjustable cyber security solution to SMEs. Obrelas’ role is to help in the research and development of a solution that would minimize the exposure of small and medium sized businesses to cyber security risks and threats as well as to help them respond successfully to cyber […]

READ MORE
When and where cyber security took a wrong turn? And how you can regain control of your company’s security posture
When and where cyber security took a wrong turn? And how you can regain control of your company’s security posture

by Ian Cook The cyber security industry appears to be struggling to keep pace with a seemingly never-ending stream of new vulnerabilities exposing organisations to ransomware attacks, corporate espionage and worse. Trade shows such as InfoSecurity Europe 2017 host hundreds of new “off-the-shelf solutions” that claim to provide cybersecurity at a stroke. The million dollar […]

READ MORE
Hewlett Packard Enterprise (HPE) Worldwide Case Study about Obrela
Hewlett Packard Enterprise (HPE) Worldwide Case Study about Obrela

Today’s vendor driven approach to cybersecurity which continues to add more and more layers, is not sustainable. With a mathematical certainty every security model will inevitably fail at least once, regardless of the defense and technology sophistication involved.   Although they have invested in the latest technology, organizations – still – cannot detect cyber threats […]

READ MORE
WannaCrypt ransomware attack

We would like to make you aware of a new ransomware that has been spread since 12th of March worldwide affecting hundreds of thousands of Windows computers and for which you should be considering the application of an emergency security patch update that Microsoft has released few hours ago. The ransomware is called WannaCrypt and […]

READ MORE
Undetectable Metasploit WAR

A possible attack path during a penetration test is having access to the administrative console of a JAVA Application Server (like WAS, JBOSS and Tomcat) installed on a Windows server with default or guessable (e.g. through brute-force) administrative credentials. The idea was to upload a Metasploit generated WAR application in order to successfully compromise the […]

READ MORE
Fast Forward Brute-Forcing Apache Tomcat 6/7/8

Intro Apache Tomcat web administrative interface often stands as a primary target during a Penetration Test due to its promising potential in case of compromise. That is why, Tomcat 6 (and above versions) implements – by default – an “anti-bruteforcing” security mechanism (LockOutRealm*). While experimenting with this feature, I’ve identified a way around that improves […]

READ MORE
Real Time Risk Management

Operational security requires a continuous process of awareness, preparedness and readiness. It is a highly demanding, cross-domain activity that requires effective communication and coordination between people that often have different knowledge and perspective for information security within the organization. It is neither a fixed cost nor a fixed duration project; rather an on-going business program […]

READ MORE
Swordfish Technology Brochure

Operational security requires a continuous process of awarene ss, preparedness and readiness; The Information Security Program. A highly  demanding, cross – domain activity that requires effective communication and coordination between people that often have different knowledge and perspective for information security within the organization. Challenged by the complexity and cost of assem bling security  knowledge, […]

READ MORE
Exposure Management Brochure

As  IT environments constantly grow due to demand and evolve due to new services such as the Internet of Things, Bring Your Own Device, Cloud  Services, Social Media and big data, IT Security becomes a necessity not only for mid to enterprise range, but for eve n smaller companies as well.  On top of that […]

READ MORE