Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports & papers.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Proof of Concept (PoC) exploit code and technical write-up have been released for the critical vulnerability CVE-2020-1147 affecting .NET Framework, Microsoft SharePoint, and Visual Studio . If exploited, CVE-2020-1147 would allow for remote code execution . This could be used for a variety of malicious purposes including data theft and malware deployment.
The release of PoC code and a technical write-up are likely to decrease the amount of time before exploitation may occur in the wild. Microsoft released security patches for this vulnerability on July 14th, 2020; organizations need to ensure that patches have been deployed on all vulnerable systems.
What we’re doing about it
What you should do about it
The vulnerability is due to a failure in .NET Framework, Microsoft SharePoint, and Visual Studio to check the source markup of XML file input.
Proof-of-Concept code for CVE-2020-1147 was first identified on July 20th, and exploitation in the wild has not yet been observed at this time. Microsoft listed this vulnerability as Exploitation More Likely, and with the release of PoC code, attacks in the wild should be considered imminent.
It should be noted that the author of the PoC code states that additional .NET based products may be vulnerable to similar attacks.
Known Affected Products: