Go to content

Resources

Image

Active scanning versus passive discovery

In our view the real-time and continuous monitoring capabilities of the agent-based approach is crucial in today’s fast paced cybersecurity environment. Swift detection of vulnerabilities and misconfigurations enable companies to quickly act on and mitigate threats before they are exploited. The Nanitor agent functions beyond potential network restrictions that ensures full and comprehensive coverage of the customers assets. 


Log4Shell, prepare for anything!

Log4Shell worst-case scenario

This has been a worst case scenario for cybersecurity professionals. A new vulnerability in Log4j (CVE-2021–44228) impacts most companies as they rely on services that use this Java library for their day-to-day operations.

Read more

Detect and remove vulnerability

Log4Fix

The experts at Nanitor have created a program that detects and removes the JndiLookup class (CVE-2021–44228) from the classpath (war/jar/ear files).

Read more

Cybersecurity strategy

How does Nanitor support your cybersecurity strategy

To enforce an effective cybersecurity policy, company executives need a crisp and concise view of their cybersecurity landscape. An incomplete view of cybersecurity issues results in the inability of the executives to adequately support their IT Ops / SecOps teams who are tasked with enforcing your cybersecurity technical policy and regulatory compliance. Without visibility, your cybersecurity strategy is at risk.

Read more

Administrative Privileges for System Administrators

Proper Use of Administrative Privileges for System Administrators in Windows Domains

One of the weaknesses in Active Directory and Windows environments that has been widely discussed but often overlooked in practice is the handling of System Administrator users and passwords. The short story is: For a compromised computer, we can essentially assume that an attacker can steal password credentials and hashes which is sufficient to remotely control other machines (pass the hash weakness in Windows).

Read more

Oracle databases under control with Nanitor

Get cybersecurity of your Oracle databases under control with Nanitor

Oracle databases like most other things come out of the box with default configuration, for example there are default passwords in place and sample users and databases if you have not been careful in the installation process.

Read more