Microsoft Defender for Endpoint – Advanced Threat Protection
Are you confident that the Endpoints in your environment are well protected against cyberthreats? Can you answer important questions such as “what KBs are missing?” or “how well are the network...
View ArticleCitrix Vulnerability Digest
On April 12th, 2022 Citrix announced vulnerabilities for multiple products including StoreFront, Endpoint Management (XenMobile), Gateway Plug-In, and SD-WAN. Follow the links below for more...
View ArticleVulnerability Warning for Chrome Users, AND Non-Users
A recently announced Chrome vulnerability needs to be addressed not only for Chrome users, but potentially more immediately for devices that have Chrome installed but not currently in use. I have...
View ArticleCitrix ADC and Citrix Gateway Security Bulletin
Issue Vulnerabilities have been discovered in Citrix ADC and Citrix Gateway that, if exploited, could result in denial of service. These vulnerabilities have the following identifiers: CVD-ID...
View Article5 Pitfalls to Avoid When Adopting New Technologies
5 Pitfalls to Avoid When Adopting New Technologies July 27, 12pm – 12:30pm ET Kraft Kennedy’s CTO, Chris Owens shares 20+ years of insights gained from his experience helping firms implement...
View ArticleCitrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27509
Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27509 Issue A vulnerability has been discovered in Citrix ADC and Citrix Gateway which enables an attacker to create a specially crafted URL...
View ArticleThe Tale of the Invisible Intruder
In a typical horror film, the victim goes about their normal day, blissfully unaware of a sinister character lurking in the shadows, ready to pounce. Too scared to read on but want us to check under...
View ArticleHow a Passwordless Environment is More Secure
Here’s a radical idea: What if users didn’t need to know their passwords? Kraft Kennedy is in the process of a watershed transition to a passwordless environment. Users still log into remote access,...
View ArticleCitrix Gateway and Citrix ADC Security Bulletin for CVE-2022-27510...
Citrix Gateway and Citrix ADC Security Bulletin for CVE-2022-27510 CVE-2022-27513 and CVE-2022-27516 Issue Vulnerabilities have been discovered in Citrix Gateway and Citrix ADC, listed below. Note that...
View ArticleWhy Is Patching So Important?
Why Is Patching So Important? Originally published on PinHawk Invisible Intruder Patching servers is a time-consuming and tedious task that many firms have been putting off due to resource constraints....
View ArticleCitrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27518
Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27518 Issue A vulnerability has been discovered in Citrix Gateway and Citrix ADC, listed below, that, if exploited, could allow an...
View ArticleCitrix Security Bulletin for CVE-2023-24483
Citrix Virtual Apps and Desktops Security Bulletin for CVE-2023-24483 Issue Vulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the...
View ArticleCitrix – Update Required
Citrix – License Server Update Required by March 31, 2023 Issue Citrix recently announced that later this year their Cloud Software Group will begin requiring the collection of limited license...
View ArticleExchange Online Kiosk Mode: Preventing Downloads of Firm Content on Non-Firm...
We recently received a request to configure Exchange Online Kiosk Mode to limit firm email access to OWA for specific users and groups. Specifically, the aim was the preventing the download of...
View ArticleWhat’s New in Windows LAPS
New and Improved LAPS Microsoft recently announced the new and improved Windows LAPS. You may be familiar with the existing security product known as Microsoft Local Administrator Password Solution...
View ArticleCitrix Security Bulletin for CVE-2023-24487, CVE-2023-24488
Issue Vulnerabilities have been discovered in the Citrix ADC and Citrix Gateway versions listed below. If exploited, they can result in the following security issues: tr:nth-child(ODD)...
View ArticleEstablishing Trust in Zero Trust
What is Zero Trust? The ‘Zero Trust’ model is, in short, don’t trust, verify! A technology based defense to shore-up security vulnerabilities, the Zero Trust concept has quickly become the go-to...
View ArticleBeware of ‘Greatness’: Don’t Get Hooked by Phishing-as-a-Service
Bad actors are getting creative in their quest to access sensitive information. Awareness is one of best forms of defense and to that end, we’re sharing a two-minute overview of a notable newly...
View ArticleHow to Combat AI-Enhanced Scams
With the introduction of AI tools, bad actors are running complex phishing scams at a higher volume than ever, forcing organizations to increase their security posture on the digital and human front....
View ArticleWindows and Linux Virtual Delivery Agent for CVAD and Citrix DaaS Security...
Issue A vulnerability has been identified that, if exploited, could result in the following security vulnerability: tr:nth-child(ODD) {background-color:#8ed1fc40;} CVD-ID Description Pre-Requisites CWE...
View Article