0
Skip to Content
Secmatics
Home
Solutions
Attack Surface Management
Small to Medium Sized Business Security
Secmatics Zero Trust
Technical Security Consulting
Services
Penetration Testing
Cyber➾Guard: Security for SMBs
Surface Guard: Vulnerability Monitoring
Surface Scan: Attack Surface Discovery
Cyber Mentor: Cybersecurity Support
Application Security Analysis
Managed Security Monitoring
Cybersecurity Consulting Services
Secure Deployment Assessment
Attack Surface Management
Converged Threat Intelligence
Automated Compliance Monitoring
Blog
About
Contact
News
Search
Secmatics
Home
Solutions
Attack Surface Management
Small to Medium Sized Business Security
Secmatics Zero Trust
Technical Security Consulting
Services
Penetration Testing
Cyber➾Guard: Security for SMBs
Surface Guard: Vulnerability Monitoring
Surface Scan: Attack Surface Discovery
Cyber Mentor: Cybersecurity Support
Application Security Analysis
Managed Security Monitoring
Cybersecurity Consulting Services
Secure Deployment Assessment
Attack Surface Management
Converged Threat Intelligence
Automated Compliance Monitoring
Blog
About
Contact
News
Search
Home
Folder: Solutions
Back
Attack Surface Management
Small to Medium Sized Business Security
Secmatics Zero Trust
Technical Security Consulting
Folder: Services
Back
Penetration Testing
Cyber➾Guard: Security for SMBs
Surface Guard: Vulnerability Monitoring
Surface Scan: Attack Surface Discovery
Cyber Mentor: Cybersecurity Support
Application Security Analysis
Managed Security Monitoring
Cybersecurity Consulting Services
Secure Deployment Assessment
Attack Surface Management
Converged Threat Intelligence
Automated Compliance Monitoring
Blog
About
Contact
News
Search
Peering Down the Remote Desktop Rabbit Hole
Risk Management Ian Wright 20/05/2024 Risk Management Ian Wright 20/05/2024

Peering Down the Remote Desktop Rabbit Hole

We take a brief look at the risk of exposing Microsoft’s Remote Desktop (RDP) directly to the Internet. TL;DR: Don't do it. 

Read More
Dear Open Source, Can we ever trust you again?
Vulnerability Patching Ian Wright 07/04/2024 Vulnerability Patching Ian Wright 07/04/2024

Dear Open Source, Can we ever trust you again?

CVE-2024-3094: Taking a look at the real implications of the XZ backdoor.

Read More
NetScaler CVE-2023-3519: Exploit Campaign Analysis
Vulnerability Patching Ian Wright 13/12/2023 Vulnerability Patching Ian Wright 13/12/2023

NetScaler CVE-2023-3519: Exploit Campaign Analysis

We take a detailed look into a global $100M exploit campaign using CVE-2023-3519 to attack Citrix NetScaler appliances.

Read More
Threat Driven Security
Risk Management Ian Wright 03/10/2023 Risk Management Ian Wright 03/10/2023

Threat Driven Security

Is framework centric security making life easy for the attackers?

Read More
Phishing with FIDO
Risk Management Ian Wright 22/09/2023 Risk Management Ian Wright 22/09/2023

Phishing with FIDO

How does FIDO based MFA prevent Phishing attacks? And could this protection be undermined by some very common vulnerabilities?

Read More
Why did Google weaken their own 2FA Authenticator?
Risk Management Ian Wright 18/09/2023 Risk Management Ian Wright 18/09/2023

Why did Google weaken their own 2FA Authenticator?

Retool breach: Why did Google add a feature that increases risk to Authenticator 2FA users?

Read More
A Million Weak SSH Keys?
Vulnerabilities Ian Wright 12/09/2023 Vulnerabilities Ian Wright 12/09/2023

A Million Weak SSH Keys?

Automated vulnerability detection using Internet-visible shared SSH host keys.

Read More
Losing the Keys to the Kingdom
Risk Management Ian Wright 21/08/2023 Risk Management Ian Wright 21/08/2023

Losing the Keys to the Kingdom

How did Microsoft lose control of a key that secures hundreds of millions of customer accounts?

Read More
We need to talk about Product Security
Ian Wright 02/08/2023 Ian Wright 02/08/2023

We need to talk about Product Security

Why do vendors keep selling software with trivially exploitable vulnerabilities? And what can we do about it?

Read More
Is Your Network Infested with Zombies?
Network Security Ian Wright 18/07/2023 Network Security Ian Wright 18/07/2023

Is Your Network Infested with Zombies?

Are Zombie hosts exposing your network? Find out how to defend yourself against this lurking threat.

Read More
What is Attack Surface Management?
Security Fundamentals Ian Wright 23/06/2023 Security Fundamentals Ian Wright 23/06/2023

What is Attack Surface Management?

Attack Surface Management: What is it? And how do you do it?

Read More
Reading The Runes: Is the XORtigate vulnerability even worse than it looks?
Vulnerabilities Ian Wright 22/06/2023 Vulnerabilities Ian Wright 22/06/2023

Reading The Runes: Is the XORtigate vulnerability even worse than it looks?

What does XORtigate (CVE-2023-27997) tell us about Fortinet Product Security?

Read More
MOVEit Exploit: Predictable and Avoidable?
Vulnerabilities Ian Wright 21/06/2023 Vulnerabilities Ian Wright 21/06/2023

MOVEit Exploit: Predictable and Avoidable?

Was the recent MOVEit exploit predictable?

Read More
MOVEit Transfer
Ian Wright 07/06/2023 Ian Wright 07/06/2023

MOVEit Transfer

An initial look at the latest MOVEit Transfer exploit.

Read More
Aspera Under Attack
Vulnerability Patching Ian Wright 13/04/2023 Vulnerability Patching Ian Wright 13/04/2023

Aspera Under Attack

If you own or use an IBM Aspera deployment then you could be at risk. Read our analysis of CVE-2022-47986, CVE-2023-27284 and CVE-2023-27286.

Read More
The Importance of Risk Management
Vulnerabilities, Risk Management Ian Wright 20/03/2023 Vulnerabilities, Risk Management Ian Wright 20/03/2023

The Importance of Risk Management

Why are so many organisations getting patch management wrong?

Read More
Patch or Be Damned
Vulnerability Patching Ian Wright 13/03/2023 Vulnerability Patching Ian Wright 13/03/2023

Patch or Be Damned

Measuring real-world patch time for Microsoft Exchange Server vulnerabilities.

Read More
Understanding Attack Surface
Security Fundamentals Ian Wright 03/03/2023 Security Fundamentals Ian Wright 03/03/2023

Understanding Attack Surface

Lean about one of the most critical, and yet most misunderstood concepts in security.

Read More
GoAnywhere MFT CVE-2023-0669
Vulnerabilities Ian Wright 26/02/2023 Vulnerabilities Ian Wright 26/02/2023

GoAnywhere MFT CVE-2023-0669

A sign of things to come?

Read More

Our Services

Service Overview
Cyber➾Guard: Security for SMBs
EdgeScope: Automated Monitoring
Surface Scan
Surface Guard
Managed Security Monitoring
Secure Deployment Assessment
Attack Surface Management
Converged Threat Intelligence

Patch Compliance Monitoring
Cyber Mentor

Latest Blog Posts

Peering down the Remote Desktop Rabbit Hole
Dear Open Source, Can we ever trust you again?
NetScaler CVE-2023-3519 Exploit Analysis
Threat Driven Security
Phishing with FIDO
Did Google weaken their Authenticator?
A Million Weak SSH Keys?
Losing the Keys to the Kingdom
We need to talk about Product Security
What is Attack Surface Management?
MOVEit Exploit: Predictable and Avoidable?

About Secmatics

Secmatics Limited is registered in England
Company Number: 11298872
VAT Number: 322117157
Phone: +44 (0)1487 404302
Email: sales@secmatics.com
© 2024 Secmatics Limited
About Us
Privacy Policy
Terms of Service

Get in Touch

Secmatics Logo