Etek

Join ETEK on LinkedIn for top cybersecurity insights and updates.

Home > Cases Studies

CASE STUDIES

ETEK USE CASES

Proud Projects That
make us stand out

Bridging the Cybersecurity Divide: The Cost of Fragmentation vs. The Value of Consolidation 

Bridging the Cybersecurity Divide: The Cost of Fragmentation vs. The Value of Consolidation 

In today’s cybersecurity landscape, many organizations find themselves relying on a patchwork of specialized tools designed to address specific security needs. While each of these tools is undoubtedly important, the lack of cohesion among them can lead to a host of issues, creating an environment where the sum of the parts may be decidedly less […]

Our Unique Approach for Comprehensive Threat Coverage 

Our Unique Approach for Comprehensive Threat Coverage 

In today’s ever-evolving threat landscape, having a proactive cybersecurity strategy is not just a good idea—it’s a business imperative. One of the key challenges companies face is ensuring comprehensive threat coverage that is proactive rather than reactive. This is where ETEK’s unique approach comes into play. Our model incorporates several elements that contribute to a […]

How technology made Businesses more efficient

How technology made Businesses more efficient

ETEK delivers proactive cybersecurity by leveraging powerful platforms, automation, and service excellence. We make your business sustainable by understanding context, empowering people, rapidly detecting and responding, and reducing cyber risks continuously.

Why is the Health and Pharma Sector a Target for Ransomware?

Why is the Health and Pharma Sector a Target for Ransomware?

The health and pharma sector has become an increasingly popular target for ransomware attacks in recent years. This is due to several factors, including the high value of sensitive medical and patient data, the critical nature of healthcare services, and the relative ease with which attackers can gain access to vulnerable systems. In recent years, […]

Critical vulnerability in windows is exploited via office documents

Critical vulnerability in windows is exploited via office documents

Based on the Microsoft Support Diagnostic Tool (MSDT), Microsoft issues vulnerability CVE-2022-30190. Microsoft Office vulnerability dubbed “Follina” is recently disclosed in attacks targeting government entities in Europe and the US. The Follina vulnerability is characterized mainly by the easy exploitability that a cybercriminal can have since they will be able to use Office documents without […]

Vulnerabilities on Cisco equipment could allow remote code execution and denials of service.

Vulnerabilities on Cisco equipment could allow remote code execution and denials of service.

In recent days, Cisco published several security bulletins that indicate that multiple vulnerabilities have been detected in the API and management interface on Cisco Expressway and Cisco TelePresence Video Communication Server (VCS) equipment. These weaknesses allow remote attackers to have read and write permissions on application files and execute remote code on the system with […]

Security entities warn of dangerous new malware

Security entities warn of dangerous new malware

In a joint statement from the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the UK National Cyber Security Center (NCSC) reported that the hacking group known as Sandworm is employing a dangerous new malware variant. Identified as Cyclops Blink, the creation of this new […]

New Variant – Mylobot Malware

New Variant – Mylobot Malware

Mylobot is a botnet malware, which infiltrates the Dark Web. It shows a high level of complexity based on evasion techniques. In terms of function, Mylobot can be used to download any payload, be it crypto mining, ransomware, banking Trojans, spyware, or other malware. STEALTH PROCESSES Anti-virtual (VM) and anti-sandbox: The malware looks for its […]

Cisco Issues Email Security Updates Due to DoS Issue

Cisco Issues Email Security Updates Due to DoS Issue

Cisco has found a high-criticality vulnerability that could allow remote attackers to crash Cisco secure email devices using maliciously crafted email messages. The vulnerability CVE-2022-20653 describes that the DNS-based named entity authentication (DANE) email verification component of the Cisco AsyncOS for Cisco Email Security Appliance (ESA) software could allow an unauthenticated remote attacker to cause […]

Microsoft Windows REGSVR32 Vulnerability

Microsoft Windows REGSVR32 Vulnerability

Microsoft Windows REGSVR32 Vulnerability Researchers report the detection of an increase in the use of the regsvr32.exe process through various Microsoft Office documents. According to the report, malware variants have been identified trying to execute .ocx files in a technique known as Squablydoo, malware distributors are using this technique to spread Qbot and Lokibot through […]

Apply Now