Critical Windows bug fixed today is actively being exploited to hack users

“Microsoft on Tuesday patched two Windows vulnerabilities that attackers are actively exploiting in the wild to install malicious apps on the computers of unwitting users.”   — Ars Technica Read the full article here

Cisco Remote Execution and Denial of Service Vulnerability

“A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.” (Cisco Security Advisories and Alerts) Read the full article HERE  

Passwords – 3 Things You’re Probably Doing Wrong

3 Things You’re Probably Doing Wrong With Your Passwords   Passwords are the gatekeepers that allow you to access your most sensitive information. All it takes to withdraw all your money from your bank account is a password. Yet many people do not have secure passwords, making it much easier for the password to fall […]

How to Protect Your Company from Ransomware: Best Practices for End Users

CrossRealms is taking measures to help clients prevent Cryptolocker and other ransomware attacks at the enterprise level, but many IT managers are asking us whether there’s more that end users can do to help keep their organizations safe. The answer is “yes. “What is Ransomware? Ransomware is a particularly aggressive form of malware that poses […]

Fix Palo Alto Web Login Failure and Protect Your Firewall from Unauthorized Access

Unable to Login to Palo Alto Networks Web Interface I recently have heard from several clients who were unable to access their Palo Alto firewall through the Web interface. At first glance, there appeared to be a problem with the password. As I further investigated the issue, however, I discovered that I was able to […]

Deploying 3CX with Cisco ASA Firewall

One of the common mistakes when installing a voice over IP (VoIP) system is the firewall configuration. Since VoIP systems depend on the Internet to send and receive calls, any misconfiguration will lead to one way audio and or complete loss of ability to either make or receive calls. In this example, I’m going to […]

MAC Address Limit on the Palo Alto 500 Firewalls

One of my clients recently suffered from continuous semi-outages with peculiar symptoms. As the number of people logging onto the internal network increased, new users were unable to access resources while existing users were completely unaffected. Initially, the two causes that came to mind were service policy limits and utilization on the data plane. I […]

A Quantum Internet for Better Cybersecurity

Los Alamos National Labs has revealed their development and use of a perfectly secure quantum internet.  The theories behind this technology could be used to provide secure connections on a much larger scale. Basic quantum mechanics tells us that the act of measuring a quantum object, such as a photon, inherently changes that object.  So, […]

Search Engines Found to Deliver Malware

A recent study has revealed that search engines sometimes deliver websites infected with malware among their top results.  Though Google and Bing performed best among all search engines tested in the study, they were not immune to such occurrences.  The 18-month study, conducted by the AV-TEST Institute, found that, of the two to three billion […]