Placeholder Image 3


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

About Us

Our Company

Accu-Networks is the trade name of Arissa LLC, an Albany based organization founded by Jeff Clesceri in April 2006. Accu-Networks is a full-service IT consulting firm focused on providing high quality consulting assistance and technical support.

Our client base is primarily comprised of small-to-medium businesses such as private enterprises, not-for-profit organizations, educational institutions, and government agencies located in the Greater Capital District.

Our Story

Jeff Clesceri is a graduate of Rensselaer Polytechnic Institute, holding a Bachelor of Science cum laude. Jeff's professional career began with a local consultancy where he was employed as a network engineer for several years, learning the industry from the ground up. Over these years, Jeff built a professional network of engineers and consultants who share a common vision of how an IT consultancy should conduct business. Accu-Networks is the culmination of that vision.

Since its inception, Accu-Networks has assisted a variety of companies and organizations in the evaluation and application of technology with regard to their critical business processes. We enjoy collaborating with our fellow small business owners to help find the right balance of practicality and technological complexity, with due attention to the all-important bottom line.



Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

We’re always eager for new research and learning opportunities, but this time, serendipitously, the opportunity found us. At the closing party of the Hack In The Box Amsterdam conference — where we presented our industrial radio research and ran a CTS contest — we were given LED wristbands to wear. They’re flashing wristbands meant to enhance the experience of an event, party, or show. At the beginning, we were not interested in the security impact; we just wanted to learn. Later on, however, we discovered that the RF link was used to transport an industrial protocol: DMX512 (Digital MultipleX 512), the same protocol used to pilot large light exhibitions.

The post Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics appeared first on .

Posted on 13 September 2019 | 5:02 am

From BinDiff to Zero-Day: A Proof of Concept Exploiting CVE-2019-1208 in Internet Explorer

Last June, I disclosed a use-after-free (UAF) vulnerability in Internet Explorer (IE) to Microsoft. It was rated as critical, designated as CVE-2019-1208, and then addressed in Microsoft’s September Patch Tuesday. I discovered this flaw through BinDiff (a binary code analysis tool) and wrote a proof of concept (PoC) showing how it can be fully and consistently exploited in Windows 10 RS5.

A more in-depth analysis of this vulnerability is in this technical brief. As mentioned, CVE-2019-1208 is a UAF vulnerability. This class of security flaws can corrupt valid data, crash a process, and, depending on when it is triggered, can enable an attacker to execute arbitrary or remote code. In the case of CVE-2019-1208, an attacker successfully exploiting this vulnerability could gain the same rights as the current user in the system. If the current user has administrative privileges, the attacker can hijack the affected system — from installing or uninstalling programs and viewing and modifying data to creating user accounts with full privileges.

The post From BinDiff to Zero-Day: A Proof of Concept Exploiting CVE-2019-1208 in Internet Explorer appeared first on .

Posted on 12 September 2019 | 5:08 am

September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days

Microsoft’s September Patch Tuesday covered 80 CVEs, 17 of which were rated critical, and included patches for Azure DevOps Server, Chakra Scripting engine, and Microsoft SharePoint. Sixty-two were labeled as important and included patches for Microsoft Excel, Microsoft Edge, and Microsoft Exchange. Only one was rated as moderate.

The post September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days appeared first on .

Posted on 10 September 2019 | 10:40 pm