Identity Management Passwords Uncategorised Password Fatigue: How To Avoid It February 27, 2024 by Lee Painter Many employees at all kinds of businesses can suffer from password fatigue. It is a very real problem, which can be a struggle to deal with, and often it goes unnoticed. In this article, we will aim to provide a comprehensive analysis of what it is, as well as steps that you can take as […] Read more »
Uncategorised What is an OTP Bot (and How To Protect Yourself) February 14, 2024 by Lee Painter In this article, we will discuss what an OTP bot is, signs that you can look out for to identify it, and how to protect yourself should you need to. We will also discuss how they work and their primary purpose. What is an OTP Bot? An OTP bot is short for a one-time password […] Read more »
Uncategorised MFA Fatigue Attacks: How Can You Protect Your Business? February 14, 2024 by Lee Painter MFA Fatigue Attacks: A Business Protection Guide MFA fatigue attacks are a huge concern for any business, particularly those operating fully within the digital sphere. This article will aim to outline what MFA fatigue attacks are and how they can be prevented. Real-life case study examples will be cited to understand these attacks fully. In […] Read more »
Uncategorised Java Class Files – Here’s How To Protect Them January 5, 2024 by Lee Painter JAVA Protector: How Can You Protect Your Java Class Files? In this article, we will discuss how you can protect your files and some real-life case study examples. Furthermore, we will discuss future security trends, how you can prepare for these, and the advantages and disadvantages of the methods discussed. What Are Java Class Files? […] Read more »
Uncategorised How to mitigate against SSH Vulnerability CVE-2023-48795 with Maverick Legacy Client December 28, 2023 by Lee Painter There are several options available to mitigate the risk of exposure to CVE-2023-48795 for Maverick Legacy Client-enabled applications In code Use the code below before making any call to SshConnector.connect. Using System Properties You do not need to make any code changes if you have a sensitive deployment. By adding the JVM arguments below, you […] Read more »
Uncategorised Important Java SSH Security Update: New SSH Vulnerability Discovered – CVE-2023-48795 December 18, 2023 by Lee Painter Today, we bring to your attention a critical security announcement that demands immediate attention from system administrators, security professionals, and all Secure Shell (SSH) technology users. A team of security researchers from Ruhr University Bochum has uncovered significant vulnerabilities in SSH, which seriously threaten channel integrity. You can find comprehensive details of these findings at […] Read more » Java SSH SSH
Uncategorised Addressing the Passive SSH Key Compromise: Security Update for Maverick Servers November 21, 2023 by Lee Painter Introduction In the dynamic landscape of cybersecurity, vigilance is critical. A recent study has highlighted a vulnerability known as “Passive SSH Key Compromise,” which poses risks to SSH connections through certain RSA key signature generation flaws. At Jadaptive, we prioritize your security and have conducted a comprehensive analysis of our products in light of this […] Read more »
Uncategorised White Box Penetration Testing: A Brief Guide September 28, 2023 by Lee Painter White Box Penetration Testing: An Introduction In this guide, we will discuss what white box penetration testing is, as well as discussing black box penetration testing, grey box penetration testing, and the various benefits associated with it. What is Penetration Testing? Defined simply, penetration is where an ethical hacker is given access to a network, […] Read more »
Uncategorised MFA Bombing: Everything You Need to Know September 28, 2023 by Lee Painter MFA Bombing: How Does it Work? MFA bombing (multi-factor authentication) bombing, is a type of social engineering cyber attack during which hackers repeatedly push authentication requests. The end goal of this is to cause a user to enable hackers to access the now-compromised account. What is MFA? This is the definition of MFA bombing (you […] Read more »
Uncategorised Integrating WireGuard with Active Directory: Bridging the Gap September 27, 2023 by Lee Painter Integrating WireGuard with Active Directory: Bridging the Gap WireGuard is rapidly becoming the go-to VPN protocol of many due to its speed, simplicity, and strong encryption. However, as enterprises migrate or consider migrating to WireGuard, they often face a fundamental challenge: Integrating it seamlessly with their existing user management systems, such as Active Directory (AD). […] Read more »