Posts

Cyber 2.0 vs Traditional antivirus and Organizational Firewall

Current security standards in an organization consists of the following base components: ·          Antivirus (standard and or next gen) ·          EDR or IDS\IPS systems ·          Organizational Firewall Each defense mechanism Is designed to stop Cyber Threats in its own way: Standard Antivirus: Search for signatures of known virus and malware codes Next Gen Antivirus: Search for anomaly in either the code or the behaviors of the programs EDR and IDS\IPS system: analyses the traffic of the network for known signatures, anomaly’s or suspicious behavior The firewalls (internal or external): minimize the allowed traffic per ports and\or applications. All of these different defense mechanisms, suffer from a vital flow that is inherit in the system: They can only protect what they know! Even the anomaly and behavior-based system, are limited by what they described as an anomaly or malicious behavior. The main problem with the current model is that this vi

Cyber ​​2.0 introduces: "Work in Time of Corona"

Cyber ​​2.0 introduces: "Work in Time of Corona" Nowadays, when the demand for employees working from home is growing, employees who leave the organizational security system, find themselves exposed to cyber attacks that exploit the fact, that their computers are exposed to threats when working from home. Massive new-generation cyber protection is required for employees working from home: protection that allows the organization's employees transparency, receiving threat alert notifications, and even blocking the threats that employees are exposed to. This protection will allow protection of the organizational components that employees are addressing, while at the same time allowing employees to maintain their privacy Cyber ​​2.0, which provides a service that essentially prevents and blocks any spread of cyber - attack, including new and unknown attacks, within and outside the organizational system, has already begun moving its customers into a configurati

Protecting yourself in the Cyber Arena – Understanding Admin rights

Step 1 – Understanding Admin rights More important: Who has them, and why they(you) don’t need them. Let's start at the very beginning: What exactly are Admin rights (or Admin privileges /Access)? Admin rights are the ultimate access to a given resource in a computerized environment. It means that the one that has Admin rights, can do whatever he wants with that specific resource. A resource on a computer can be a lot of things, for example, it can be a file (doc, spreadsheet and similar), a folder, a program/application/game/ configuration changes and it can even be the Computer itself. A resource on a Network can be all of the above, plus it can also be a trillion more things, a minor example can be: Network folders, files or shares, database, apps, web apps, printers, cameras, camera server…. and so much more, as much as you can imagine. Everything in the computer world every object, has an access right: when you interact with an object, the level of rights

Understanding Mimikatz - The basics

Mimikatz - What is it and what can you do against it ? Mimikatz is a self-exploitation tool designed mainly to steal a password. But nothing is as simple as it sounds because it doesn’t really steal passwords, it steals authentication Tokens\Tickets or password hashes. Sound baffling? Actually, it’s a lot simpler than it sounds. It is a common misconception to think that in order to gain access to a certain resource on a computer or a network, all you need is the username and password that allows you access to that specific resource. In theory that is correct, but in the background something completely different is happening. In order to gain the desired access, you need the correct key, and the correct key is what happens after you punch in your password. Let me explain: In order to prevent the stealing of the password by various mechanics, the password is never stored as it is. Instead, it is stored as Hash: a mathematical function that changes the password into

A new blog - Making Cyber Security Easier - Introduction

Making Cyber Security Easier, Simpler and More Secure by Erez Kaplan -Cyber 2.0 CTO In this blog, I will take the complicated world of Cyber Security, and strip it down to its bare essence, while helping you make your network more secure. When necessary, I will delve into the depths and mechanics of new and intriguing attacks, and the ways of defending against them. If you want me to write about a specific Subject, Or have a specific question you want answered. Please write it in your comments, And I will do my best to answer. Best Regards Erez Kaplan Haelion Cyber 2.0 - CTO www,cyber20.com