Insight Showcase

A Dummy’s Guide to ACSC E8 Assessment Approach

Australian Cyber Security Centre’s (ACSC) Strategy to Mitigate Cyber Security Incidents provides a prioritised list of mitigation strategies to assist organisations in protecting their systems and their crown jewels against a range of adversaries. The mitigation strategies advised by ACSC vary and can be customised based on the risk profile, the industry sector and the adversaries the organisation is most concerned with.

A Dummy’s Guide to ACSC E8 Assessment Approach Read More »

CVE-2020-3977: VMware Horizon DaaS Broken Authentication (MFA Bypass)

Not long ago, I assisted a client of ours with a penetration test of their VMware Horizon remote access solution and discovered a vulnerability affecting how it handles Multi-Factor Authentication (MFA). As a result, with a compromised user account password, I could gain access to the organisations internal network from the internet, bypassing the MFA

CVE-2020-3977: VMware Horizon DaaS Broken Authentication (MFA Bypass) Read More »

business continuity feature image

Ensure business continuity via long-term Cyber Hygiene practices

Written by Breton Chan, Privasec’s Marketing ExecutiveHow prepared is your business for upcoming challenges in the digital landscape?In recent research data released by the Ponemon Institute and IBM Security, cyber crimes accounted for 18.6% of all crime in Singapore. The average cost of a data breach per organisation in the ASEAN bloc sits

Ensure business continuity via long-term Cyber Hygiene practices Read More »

Scroll to Top