Blogs

Follina detection and remediation ...

See how Gytpol detects and remediates Follina with zero impact   Once again, Gytpol is the only solution in the market to provide a full remediation to this unresolved zero ...

Cybernews Interview with Tal Kollender

Cybernews interviews our very own Tal Kollender about GYTPOL on how hackers exploit OS security gaps due to misconfigurations. Read the article here https://cybernews.com/

Log4J / Log4Shell – GYTPOL ...

Log4Shell . The latest vulnerability is causing a cybersecurity meltdown in the security community. It’s been 12 months to the day since FireEye announced that they were victim of the now ...

Safe Remediation

Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with.  But it is one of the most critical to manage, as a ...

Automated Fixes

Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to ...

Lateral Movement is the Key Issue

Black Hat USA 2021 was pretty sparsely attended but to be honest we enjoyed the show! Having finally gotten home it took me a week or so to decompress from all the travel and the meetings but I ...

Misconfigurations – The Real ...

As a definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.  Hackers in most ...

AD Threats

Active Directory Threats Do threats against your infrastructure’s Active Directory security keep you up at night? Honestly, it should. Active Directory is critical as it controls access to ...

Cyber Workout

Cyber Workout I like to work out! I got the bug when I was serving in the armed forces and it has stuck with me ever since.  I enjoy different and difficult types of exercise that ...