Search Results for: database security Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Blog Post Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction... Blog Post How to Implement Secure SDLC to Enhance Your Product Development in 5 Stages March 15, 2021 Any business, organization, or team working in the software development field has heard of the software development lifecycle (SDLC). This... Blog Post Cornerstone Payment Systems Leaked 6.7M Records February 3, 2020 Recently, Cornerstone payment processing company was found failing to protect its database containing credit card transactions. The Cornerstone Payment System... Blog Post COVID‐19 Cyber Threat Coalition – USSS Information Alert May 2, 2020 Criminal groups are exploiting the COVID‐19 pandemic to target healthcare systems and critical IT infrastructure all over the world. The... Blog Post Increase in Extortionate Emails – USSS Information Alert May 1, 2020 The United States Secret Service has recently observed an increase in extortion email scams. These are not necessarily new methods... Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to... Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried... Blog Post Citrix Allowed Hackers to Linger For 5 Months! February 22, 2020 Citrix just reported that for five months, between 2018 and 2019, hackers were inside its network systems and stealing financial... Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new... Blog Post What is Access Control? May 11, 2020 Data confidentiality, availability, controllability and integrity are the main research contents of data security technology. The theoretical basis of data...
Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction...
Blog Post How to Implement Secure SDLC to Enhance Your Product Development in 5 Stages March 15, 2021 Any business, organization, or team working in the software development field has heard of the software development lifecycle (SDLC). This...
Blog Post Cornerstone Payment Systems Leaked 6.7M Records February 3, 2020 Recently, Cornerstone payment processing company was found failing to protect its database containing credit card transactions. The Cornerstone Payment System...
Blog Post COVID‐19 Cyber Threat Coalition – USSS Information Alert May 2, 2020 Criminal groups are exploiting the COVID‐19 pandemic to target healthcare systems and critical IT infrastructure all over the world. The...
Blog Post Increase in Extortionate Emails – USSS Information Alert May 1, 2020 The United States Secret Service has recently observed an increase in extortion email scams. These are not necessarily new methods...
Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to...
Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried...
Blog Post Citrix Allowed Hackers to Linger For 5 Months! February 22, 2020 Citrix just reported that for five months, between 2018 and 2019, hackers were inside its network systems and stealing financial...
Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new...
Blog Post What is Access Control? May 11, 2020 Data confidentiality, availability, controllability and integrity are the main research contents of data security technology. The theoretical basis of data...