Cybersecurity Insights

Paul Taylor

Foregenix Identify Multiple Dell EMC RecoverPoint Zero-Day Vulnerabilities

21/05/18 09:14

Foregenix is disclosing six vulnerabilities which were identified in Dell EMC RecoverPoint products during a recent engagement.

Read More
Benjamin Hosack

New Services to Secure Blockchain & Cryptocurrency

16/05/18 12:30

Foregenix is proud to announce the launch of its Blockchain & Cryptocurrency Security Practice. Building upon years of experience in the Payment Card Industry (PCI) helping organisations secure their people, processes and technology, and in response to constantly increasing cybersecurity attacks, Foregenix is once again extending its portfolio of services.

Read More
Jake Dennys

Foregenix Take Best Security at The Techies 2018!

14/05/18 15:42

The Techie Awards 2018 are a Business Exchange initiative, created to celebrate the innovation and entrepreneurship of the IT community in Swindon & Wiltshire. We were named as finalists among 12 other companies and were lucky enough to come away with the accolade of ‘Best Tech Security’.

Read More

Facebook Ads Extension for Magento Leaking Magento Version

25/04/18 16:55

When looking for new websites to target, a typical hacker will try to find sites which will require as little effort as possible for them to breach. Ideally they are looking for sites that are running outdated versions of frameworks such as Magento and WordPress, which may be missing critical security patches. Once they have identified a site like this they can usually use a pre-made exploit instead of having to craft their own code to gain access to the server.

Read More
Duncan Slater

Reducing the Impact of a Breach Through Early Detection (Part 2) - Incident Response vs Incident Readiness

18/04/18 10:57

This two-part series is focused on reducing the impact of a breach through early detection. In part one we looked at the change in mindset from purely preventative measures, to implementing effective detection methods within your environment; and the positive impact that this could have.  In this article we will look at bridging the gap between the initial point of intrusion and instigation of an effective incident response plan.

80% of businesses do not have an incident response plan, 15% have a documented plan but lack the foundation to provide an efficient or effective response, leaving only 5% [1] of business with an actionable incident response plan in place.  In this, the second part of our IR series we are going to look at the need for an effective and functional Incident Response plan.

Read More
Paul Taylor

Foregenix Identify Multiple Dell EMC RecoverPoint Zero-Day Vulnerabilities

21/05/18 09:14

Foregenix is disclosing six vulnerabilities which were identified in Dell EMC RecoverPoint products during a recent engagement.

Read More
Benjamin Hosack

New Services to Secure Blockchain & Cryptocurrency

16/05/18 12:30

Foregenix is proud to announce the launch of its Blockchain & Cryptocurrency Security Practice. Building upon years of experience in the Payment Card Industry (PCI) helping organisations secure their people, processes and technology, and in response to constantly increasing cybersecurity attacks, Foregenix is once again extending its portfolio of services.

Read More
Jake Dennys

Foregenix Take Best Security at The Techies 2018!

14/05/18 15:42

The Techie Awards 2018 are a Business Exchange initiative, created to celebrate the innovation and entrepreneurship of the IT community in Swindon & Wiltshire. We were named as finalists among 12 other companies and were lucky enough to come away with the accolade of ‘Best Tech Security’.

Read More

Facebook Ads Extension for Magento Leaking Magento Version

25/04/18 16:55

When looking for new websites to target, a typical hacker will try to find sites which will require as little effort as possible for them to breach. Ideally they are looking for sites that are running outdated versions of frameworks such as Magento and WordPress, which may be missing critical security patches. Once they have identified a site like this they can usually use a pre-made exploit instead of having to craft their own code to gain access to the server.

Read More
Duncan Slater

Reducing the Impact of a Breach Through Early Detection (Part 2) - Incident Response vs Incident Readiness

18/04/18 10:57

This two-part series is focused on reducing the impact of a breach through early detection. In part one we looked at the change in mindset from purely preventative measures, to implementing effective detection methods within your environment; and the positive impact that this could have.  In this article we will look at bridging the gap between the initial point of intrusion and instigation of an effective incident response plan.

80% of businesses do not have an incident response plan, 15% have a documented plan but lack the foundation to provide an efficient or effective response, leaving only 5% [1] of business with an actionable incident response plan in place.  In this, the second part of our IR series we are going to look at the need for an effective and functional Incident Response plan.

Read More