Search Results for: SolarWinds Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well... Blog Post How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face... Blog Post Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting... Blog Post Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects... Blog Post Even Fortune 500 Companies Are On the Wavelength of Poor Password Hygiene January 4, 2022 Even Fortune 500 companies do not use secure passwords when it is common knowledge that passwords are the first line... Blog Post Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank... Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing... Blog Post Massive Cyberattack on Ukrainian Government Sites January 25, 2022 The Russia-Ukraine conflict is escalating day-by-day, and a massive cyberattack on Ukrainian government sites on the night of January 13th... Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at... Blog Post Federal Government Commits Nearly $2 Billion to National Infrastructure Cybersecurity September 29, 2021 In a rare move, the US Senate recently passed the Bipartisan Infrastructure Investment and Jobs Act that included a clause... Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,... Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security... Blog Post What is Patch Management? February 27, 2020 Patch management is a part of lifecycle management and is the process of applying patches to systems at the precise...
Blog Post SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat December 9, 2021 Earlier this year, a supply chain attack targeted at Solarwinds customers rocked the cybersecurity industry, implicating big tech as well...
Blog Post How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face...
Blog Post Guide To Check For Sunburst Vulnerability in SolarWinds And Whether It Was Exploited December 15, 2020 US CISA released an advisory on current activity in which it is explained that a threat actor is actively exploiting...
Blog Post Official PHP Git Repository Was Compromised March 29, 2021 Do you remember the SolarWinds supply chain compromise, was revealed in December 2020? It seems that a similar issue affects...
Blog Post Even Fortune 500 Companies Are On the Wavelength of Poor Password Hygiene January 4, 2022 Even Fortune 500 companies do not use secure passwords when it is common knowledge that passwords are the first line...
Blog Post Banks On Alert Though Seemingly The Financial Sector Is Not A Specific Focus Of The Ongoing Hacking Campaign January 13, 2021 The ongoing hacking campaign has sent shock waves across the U.S. government and the private sector. Meanwhile, as per bank...
Blog Post Supply Chain Attacks And Third-Party Risk Management December 23, 2020 In real terms, third-party risk management is about identifying the vulnerabilities of your outside vendors and determining approaches to overcome...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing...
Blog Post Massive Cyberattack on Ukrainian Government Sites January 25, 2022 The Russia-Ukraine conflict is escalating day-by-day, and a massive cyberattack on Ukrainian government sites on the night of January 13th...
Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at...
Blog Post Federal Government Commits Nearly $2 Billion to National Infrastructure Cybersecurity September 29, 2021 In a rare move, the US Senate recently passed the Bipartisan Infrastructure Investment and Jobs Act that included a clause...
Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,...
Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security...
Blog Post What is Patch Management? February 27, 2020 Patch management is a part of lifecycle management and is the process of applying patches to systems at the precise...