General News
INTERPOL has reported the destruction of over 22,000 malicious servers as part of a global campaign aimed at mitigating cyber threats
This initiative, named Synergia II, took place from April 1 to August 31, 2024, focusing on activities related to fraud, ransomware, and data theft. Of approximately 30,000 suspicious IP addresses identified, 76% were taken down, and 59 servers were seized. INTERPOL also confiscated 43 electronic devices, including laptops, mobile phones, and hard drives. Furthermore, INTERPOL…
“Microsoft SharePoint RCE vulnerability exploited for Corporate network attacks
Recently, a RCE vulnerability in Microsoft SharePoint, identified as CVE-2024-38094, has been discovered and is being exploited to infiltrate corporate networks. CVE-2024-38094 has a high severity rating (CVSS score: 7.2) and affects SharePoint, a widely used web platform for building intranet sites, managing documents, and seamlessly integrating with Microsoft 365 applications. Microsoft addressed this vulnerability…
VSEC is a member of the National Cyber Security Association
On the afternoon of September 8, 2023, the National Cyber Security Association held the first National Congress, term 2023-2028. Previously, on May 8, the Association received a decision to allow its establishment from the Ministry of Home Affairs. Senior Lieutenant General Luong Tam Quang, Deputy Minister of Public Security, was elected Chairman of the Association.…
Why you should hire a CREST Penetration Testing provider?
Cyber threats evolve at a rapid pace, and one of the most effective ways to assess and improve the security posture and resilience of a company’s systems against such threats is penetration testing. By performing controlled and simulated cyber attacks against an organization, pentesting aims to identify vulnerabilities that could be exploited by malicious hackers.…
What is the difference between Pentest and Pentest as a Service?
What is the practical difference between regular pentesting and Penetration testing as a Service (PtaaS)? Let’s take a closer look at each aspect below with VSEC. Pentest is a summary of Penetration Testing – a formula that evaluates the comprehensiveness of an IT information system through simulating a real attack authorized by that organization. Simply…
Why do hackers hack?
Hackers are individuals/organizations who gain unauthorized access to other information technology systems with a specific goal, such as gaining reputation by taking down computer systems, stealing money, or making networks worse. unavailable. The experience gained from these attacks and the satisfaction derived from successful attacks can become an addiction. Some common reasons to attack include…
VSEC TI Engine
VSEC TI ENGINE – System for predicting, identifying incidents, risks of security loss The security industry around the world is in a fierce battle against cyberattacks that are increasing in number, speed and complexity. This reality requires a new approach to preventing cyber threats. According to recent studies, traditional security solutions can almost exclusively identify…
VSEC Vadar SOAR
1. THE NECESSITY OF SOAR In the current era of strong development of Information Technology, many organizations and businesses face more threats and risks. Security distribution software is constantly overloaded with warnings from various sources. In most organizations and businesses, IT infrastructure is always evolving every day. In this case, the personnel of the security…
VSEC Vadar EDR
VSEC VADAR EDR SOLUTION As network threats become increasingly sophisticated, real-time monitoring and security analysis are essential to swiftly detect and respond to threats. VSEC Vadar Endpoint Detection & Response (branded as VSEC Vadar EDR) is a system designed to detect and respond to endpoint threats, aiming to identify and eliminate malicious software or any…
VSEC Vadar SIEM
1. VSEC VADAR SECURITY INFORMATION & EVENT MANAGEMENT SOLUTIONS When the IT system of enterprises is equipped with many different brands and technology equipment. Moreover, these devices and applications offer different log formats corresponding to each provider. It is very difficult to summarize events at the time of incident, because there is no dedicated solution…
VSEC Vadar IMS
The method named VSEC Vadar Incident Management System Most of us don’t want to admit that interruptions and incidents occur more frequent than we think, especially at the workplace as well as in many circumstances, it’s inevitable. Besides, now we focus diligently on how to address those disconnection and unwanted incidents, not on why those…
VSEC Vadar NSM
VSEC VADAR NSM SOLUTION VSEC Vadar Network Security Management ( brand as VSEC Vadar NSM ) is a network management system designed to detect and prevent harmful behaviors at the network layer. Additionally, it continuously monitors, collects, records, stores and conducts in-depth analysis to promptly identify suspicious activities within the system. 2. KEY…