Search Results for: National Vulnerability Database Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new... Blog Post 50% of Servers Have Weak Security Long After Patches Are Released November 2, 2021 Patch, patch, and patch again. This mantra has been repeated by security experts over and over again as one of... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Blog Post Common Cloud Vulnerabilities May Put Your Data at Risk March 17, 2020 In the past few years, the focus of enterprises on cloud computing has been a simple transition. However, as IT... Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT... Knowledge Center Top Vulnerability Tracking Databases On The Internet June 17, 2017 To develop a proper vulnerability management program, it is essential to implement good vulnerability tracking databases. LIFARS has provided the... Blog Post Android, Linux Vulnerabilities Dominate the US-CERT Bulletin this Week May 23, 2017 The most recent vulnerability summary bulletin by the Department of Homeland Security’s US-CERT (Computer Emergency Readiness Team) highlights a number... Blog Post The Growing Importance of Bio-Cybersecurity June 4, 2019 The Growing Importance of Bio-Cybersecurity What is cyberbiosecurity? Cyberbiosecurity is a new specialty at understanding and mitigating new biological security... Blog Post Hackers stole Mars missions 500Mb of data and breached NASA’s satellite dish network June 27, 2019 The U.S. National Aeronautics and Space Administration (NASA) this week confirmed that its Jet Propulsion Laboratory (JPL) has been hacked.... Blog Post Q & A Session with Mike Fabrico of TrapX Security (Full Interview) July 2, 2018 LIFARS recently interviewed Mike Fabrico, Sales Director, TrapX Security of the US East Coast. In this three part interview, we discussed deception... Blog Post Nick Akerman on Cybersecurity and Legal Challenges October 26, 2016 A partner in Dorsey’s New York Office, Nick Akerman is a trial lawyer specializing in both complex civil and criminal... Blog Post Russian Hackers Plead Guilty in Massive Credit Card Scheme September 17, 2015 Two Russian men have pleaded guilty in New Jersey after being prosecuted for conspiring to steal more than 160 million credit and debit cards that resulted in losses of more than $300 million. Blog Post Adobe Failed to Safeguard Privacy of 38 Million Customers June 10, 2015 The Australian Privacy Commissioner concluded that Adobe breached its obligation to adhere to and uphold the Privacy Act, affecting 38 million global users.
Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new...
Blog Post 50% of Servers Have Weak Security Long After Patches Are Released November 2, 2021 Patch, patch, and patch again. This mantra has been repeated by security experts over and over again as one of...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from...
Blog Post Common Cloud Vulnerabilities May Put Your Data at Risk March 17, 2020 In the past few years, the focus of enterprises on cloud computing has been a simple transition. However, as IT...
Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT...
Knowledge Center Top Vulnerability Tracking Databases On The Internet June 17, 2017 To develop a proper vulnerability management program, it is essential to implement good vulnerability tracking databases. LIFARS has provided the...
Blog Post Android, Linux Vulnerabilities Dominate the US-CERT Bulletin this Week May 23, 2017 The most recent vulnerability summary bulletin by the Department of Homeland Security’s US-CERT (Computer Emergency Readiness Team) highlights a number...
Blog Post The Growing Importance of Bio-Cybersecurity June 4, 2019 The Growing Importance of Bio-Cybersecurity What is cyberbiosecurity? Cyberbiosecurity is a new specialty at understanding and mitigating new biological security...
Blog Post Hackers stole Mars missions 500Mb of data and breached NASA’s satellite dish network June 27, 2019 The U.S. National Aeronautics and Space Administration (NASA) this week confirmed that its Jet Propulsion Laboratory (JPL) has been hacked....
Blog Post Q & A Session with Mike Fabrico of TrapX Security (Full Interview) July 2, 2018 LIFARS recently interviewed Mike Fabrico, Sales Director, TrapX Security of the US East Coast. In this three part interview, we discussed deception...
Blog Post Nick Akerman on Cybersecurity and Legal Challenges October 26, 2016 A partner in Dorsey’s New York Office, Nick Akerman is a trial lawyer specializing in both complex civil and criminal...
Blog Post Russian Hackers Plead Guilty in Massive Credit Card Scheme September 17, 2015 Two Russian men have pleaded guilty in New Jersey after being prosecuted for conspiring to steal more than 160 million credit and debit cards that resulted in losses of more than $300 million.
Blog Post Adobe Failed to Safeguard Privacy of 38 Million Customers June 10, 2015 The Australian Privacy Commissioner concluded that Adobe breached its obligation to adhere to and uphold the Privacy Act, affecting 38 million global users.