Vicarius

Vicarius

Computer and Network Security

New York, NY 14,210 followers

Leading the pack in vulnerability remediation.

About us

Vicarius' vRx bridges the gap between vulnerability discovery and remediation with automated patching, patchless protection, and custom scripting. Trusted by 500+ customers in 60+ countries.

Website
https://vicarius.io
Industry
Computer and Network Security
Company size
51-200 employees
Headquarters
New York, NY
Type
Privately Held
Founded
2016
Specialties
Cyber, CDS, Malwares, APT, Capability Driven Security, Application Security, Risk Assessment, Vulnerability Assessment, Security, and Vulnerability Management

Products

Locations

Employees at Vicarius

Updates

  • 🕷️🦹🏻♀️ Villain of the week 🦹🏻♀️🕷️ ℹ️ CVE-2024-49112 is a critical vulnerability in Microsoft Windows' Lightweight Directory Access Protocol (LDAP). It allows unauthenticated attackers to execute arbitrary code remotely by sending specially crafted LDAP requests. Vulnerabilities of this kind are severe and warrant immediate action to mitigate risks. ⚠️ How worried should you be? This vulnerability poses a serious threat due to its remote code execution capabilities and unauthenticated attack vector. Potential consequences include: - Unauthorized control of affected systems. - Data exfiltration and service disruptions. - The possibility of large-scale network compromise. 👷 Recommended actions: ✔️ Audit and detect potential vulnerable systems. ✔️Apply the latest security patches from Microsoft. ✔️ Restrict LDAP access to trusted networks and users only. ✔️ Monitor LDAP traffic for unusual or unauthorized activity. 🐺 Use these scripts from the Vicarius Research Team: 🔗 Detection: https://lnkd.in/gMq5YQgF 🔗 Remediation: https://lnkd.in/gPARCuSY Let us know if you need help securing your systems or understanding these steps further 🤝

    • No alternative text description for this image
  • What happens if you put lessons learned in vulnerability management in a box and tie it with a bow? Well, you get a wrapped gift 🎁 Happy holidays! Spread the joy with your coworkers and office neighbors!

  • Playbooks anyone? 📓 Coach Nahuel gives us the rundown on his strategies he takes to the field 🏈 to win against exposure and tough opponents, aka CVEs. From system hardening for MITRE frameworks to incident response, Nahuel's playbooks are just the beginning of a championship team....which soon could turn into a dynasty 😉

  • 🐧😈 Villain of the Week 😈🐧 CVE-2024-43451 is a critical vulnerability in Microsoft Windows, allowing attackers to obtain a user’s NTLMv2 hash with minimal interaction. This can lead to unauthorized access through pass-the-hash attacks, enabling attackers to impersonate users and access sensitive resources without credentials. 😯 How worried should you be? This kind of vulnerability carries a severe risk, with active exploitation reported in the wild. Potential consequences include: ✔ Unauthorized access to network resources. ✔ Credential theft leading to further compromises. ✔ Potential lateral movement and privilege escalation within the environment. 👷♀️ Recommended actions: 1. Detect vulnerable systems: Use our detection script to identify systems at risk of exploitation. 2. Mitigate the issue: - Disable NTLM authentication where possible. - Enforce SMB signing and Kerberos authentication. 3. Monitor Activity: Audit logs for unusual NTLM-related traffic and interception attempts. 👨🔬 Use these scripts from the Vicarius Research Team: 🔗 Detection: https://lnkd.in/g6ptiz9X 🔗 Remediation: https://lnkd.in/gkKdYH6M Let us know if you need help securing your systems or understanding these steps further 🤝

    • No alternative text description for this image
  • View organization page for Vicarius, graphic

    14,210 followers

    In this duet rendition of The Christmas Song recorded by Nat King Cole, Vicarius singers put a cyber spin on this timeless tune 🎶🎻 Merry Hacking to you! 🌟🎄🎅🏻 Follow for more cyber parodies ☃️

Similar pages

Browse jobs

Funding