Cybersecurity, Resources |
June 9, 2022
JSA TV: Vertek Talks Turn-Key Cybersecurity Solutions for Channel at CPExpo
Cybersecurity, News and Events, Resources, Threats and IoCs |
June 3, 2022
Follina: Microsoft Office Zero Day Vulnerability
On 5/27/22 security research team, Nao_sec identified a malicious Word document in the wild, that appeared to be leveraging the “MS-MSDT” (Microsoft Support Diagnostic Tool) protocol to execute Powershell code....
Cybersecurity, Software Development, Telecom Operations |
January 6, 2022
How Vertek Services Can Help You Accelerate to Value
For decades, Vertek has helped transform and accelerate the speed of service delivery and operations for global carriers, MSOs, and MSPs. Our commitment to helping clients accelerate to value has...
Cybersecurity, How To, Resources, Threats and IoCs |
December 13, 2021
Log4Shell Vulnerability
Summary: On Dec. 9, 2021, Proof of Concept exploitation code for the remote code execution (RCE) vulnerability (CVE-2021-44228) in Apache Log4j was published to GitHub. Shortly thereafter, there was evidence...
Cybersecurity, Threats and IoCs |
December 9, 2021
The Top 4 Reasons Why Organizations Like Yours Leverage Vertek for Cybersecurity
Today’s cyber criminals have learned to capitalize on vulnerabilities created by hybrid workforces and understaffed IT and security departments. These more advanced threats have led to successful breaches and have...
Cybersecurity, Resources |
November 16, 2021
Corporate Background & Managed Security Services Portfolio
Cybersecurity, How To, Resources |
November 16, 2021
Managed Detection & Response / Managed Threat Intelligence Overview
Cybersecurity |
November 9, 2021
Network Security: Where IT, Operations, and Compliance Meet
In your organization, who handles network security? In many organizations cybersecurity becomes the IT department’s responsibility, often by default – but in reality, it affects all operational aspects of your...