Search Results for: zero-day threats Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over... Blog Post NSA Discovers New Critical Vulnerabilities In Exchange Server April 20, 2021 Admins of the Microsoft Exchange Server have been having rough weeks. Yet, matters still do not seem to be getting... Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Blog Post The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack... Blog Post 50% of Servers Have Weak Security Long After Patches Are Released November 2, 2021 Patch, patch, and patch again. This mantra has been repeated by security experts over and over again as one of... Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions.... Blog Post Forensics Analysis of the NSO Group’s Pegasus Spyware January 12, 2022 NSO’s Group Pegasus spyware was mentioned multiple times during 2021 in the media. It has been heavily analyzed by organizations... Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the... Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil... Blog Post Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,... Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and... Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level...
Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over...
Blog Post NSA Discovers New Critical Vulnerabilities In Exchange Server April 20, 2021 Admins of the Microsoft Exchange Server have been having rough weeks. Yet, matters still do not seem to be getting...
Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Blog Post The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
Blog Post 50% of Servers Have Weak Security Long After Patches Are Released November 2, 2021 Patch, patch, and patch again. This mantra has been repeated by security experts over and over again as one of...
Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions....
Blog Post Forensics Analysis of the NSO Group’s Pegasus Spyware January 12, 2022 NSO’s Group Pegasus spyware was mentioned multiple times during 2021 in the media. It has been heavily analyzed by organizations...
Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the...
Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Blog Post Saudi Aramco Acknowledged Data Leak to Attack on Supplier August 24, 2021 In late July 2021, Saudi Aramco acknowledged a data leak of its company from one of its contractors. The oil...
Blog Post Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,...
Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and...
Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level...