Placeholder Image 3

Testimonials


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
Accu-Networks."
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."
NYSUT

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

About Us



Our Company

Accu-Networks is the trade name of Arissa LLC, an Albany based organization founded by Jeff Clesceri in April 2006. Accu-Networks is a full-service IT consulting firm focused on providing high quality consulting assistance and technical support.

Our client base is primarily comprised of small-to-medium businesses such as private enterprises, not-for-profit organizations, educational institutions, and government agencies located in the Greater Capital District.


Our Story

Jeff Clesceri is a graduate of Rensselaer Polytechnic Institute, holding a Bachelor of Science cum laude. Jeff's professional career began with a local consultancy where he was employed as a network engineer for several years, learning the industry from the ground up. Over these years, Jeff built a professional network of engineers and consultants who share a common vision of how an IT consultancy should conduct business. Accu-Networks is the culmination of that vision.

Since its inception, Accu-Networks has assisted a variety of companies and organizations in the evaluation and application of technology with regard to their critical business processes. We enjoy collaborating with our fellow small business owners to help find the right balance of practicality and technological complexity, with due attention to the all-important bottom line.

 

News

Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

A Machine Learning Model to Detect Malware Variants

When malware is difficult to discover — and has limited samples for analysis — we propose a machine learning model that uses adversarial autoencoder and semantic hashing to find what bad actors try to hide. We, along with researchers from the Federation University Australia, discussed this model in our study titled “Generative Malware Outbreak Detection.”

The post A Machine Learning Model to Detect Malware Variants appeared first on .

Posted on 13 March 2019 | 6:01 am

March’s Patch Tuesday Fixes Privilege Escalation Vulnerabilities Exploited in the Wild

Microsoft’s Patch Tuesday for March addressed 64 vulnerabilities, 17 of which were rated critical, 45 important, one moderate, and another low in severity. Two of these vulnerabilities, CVE-2019-0797 and CVE-2019-0808, were reported to have been actively exploited in the wild. The patches addressed security flaws in a number of Microsoft products and services: .NET Framework, Edge, Exchange, Internet Explorer, Office, Office Services and Web Apps, NuGet, Team Foundation Server, and Windows. Seven of the vulnerabilities were disclosed via Trend Micro’s Zero Day Initiative (ZDI).

The post March’s Patch Tuesday Fixes Privilege Escalation Vulnerabilities Exploited in the Wild appeared first on .

Posted on 13 March 2019 | 12:15 am

From Fileless Techniques to Using Steganography: Examining Powload’s Evolution

In some of the recent Powload-related incidents we saw, we noticed significant changes to some of the attachments in the spam emails: the use of steganography and targeting of specific countries. Figure 2 shows the difference. For example, the samples we analyzed in early 2018 had more straightforward infection chains. These updates added another stage to the execution of malicious routines as a way to evade detection.

The Powload variants that use these techniques drop and execute the Ursnif and Bebloh data stealers. We did not see any notable differences in the payloads’ routines. The distribution tactics also resemble a spam campaign we uncovered last year, which delivered the same information stealers but distributed via the Cutwail botnet.

The post From Fileless Techniques to Using Steganography: Examining Powload’s Evolution appeared first on .

Posted on 12 March 2019 | 8:31 am