
EternalBlue: Tell me, what can I do?
Apologies upfront, in writing this blog I couldn’t resist using lyrics from the Icehouse 1987 hit Electric Blue in the heading. In the ever-evolving landscape
The team at Innoculator welcome you to our blog.

Apologies upfront, in writing this blog I couldn’t resist using lyrics from the Icehouse 1987 hit Electric Blue in the heading. In the ever-evolving landscape

Currently at Innoculator, the team are deep in testing our platform before making it generally available to the public (Not long now…). But whilst we

In the ever-evolving landscape of cybersecurity, lateral movement remains one of the most underestimated tactics utilised by attackers. While organizations often focus on securing their

As we look back at the cybersecurity landscape over the past few years, it is clear that 2024 stands out as a remarkable year in

What happens when you combine AI with virtual patching? You solve the vulnerability and legacy software problem. Melbourne, Australia – After a year of dedicated

As we here at Innoculator excitedly get ready for our product launch, we thought we would dive a bit deeper into a couple of pertinent

We started this blog at the start of last year with a post titled “We need to talk about Log4J”. With the year coming to

In today’s IT landscape, organizations face a relentless range of cyber threats. To counter these, vulnerability management has become a cornerstone of good cybersecurity management.

In the realm of cybersecurity pen-testing, the Rules of Engagement (ROE) are pivotal for structured, ethical hacking and vulnerability assessments. They specify what can and

Mergers and Acquisitions (M&A) are complex undertakings with significant strategic and operational benefits. However, they also bring with them a host of cybersecurity challenges, particularly

Legacy applications are software systems that have been in use for a long time and are based on outdated/ unpatched software. Despite their age, these

Let me be clear this isn’t a blog about apportioning blame to anyone. These sort of events have happened multiple times in the past, perhaps

Organisations are grappling with the rapid discovery and disclosure of vulnerabilities, creating a complex environment for maintaining their cyber posture. The increasing number of vulnerabilities

Having worked in cyber security for a very long time it has always been an interest to us when we see a data breach get

Time to talk about one of my favourite concepts in cyber security- Honeypots. I don’t know why, but the idea of honeypotting an attacker has