On the Log4j Vulnerability
December 14 2021It’s serious:
The range of impacts is so broad because of the nature of the vulnerability itself. Developers use logging frameworks to keep track of what happens in a...
Read more
It’s serious:
The range of impacts is so broad because of the nature of the vulnerability itself. Developers use logging frameworks to keep track of what happens in a...
Read more
One volley of fake news may land, but properly trained AI can shut down similar attempts at their sources.
Read moreGet 'em while they're hot!
Read moreThe accounting firm PricewatersCoopers recently published lessons learned from the disruptive and costly ransomware attack in May 2021 on Ireland's public health system. The unusually candid post-mortem found that...
Read moreThe three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
Read moreEvery high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
Read moreGovernment actions help starve attack groups of the resources - money, ability to recruit, and time.
Read moreThis Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
Read moreThis Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
Read moreThe company confirmed last week that one of its file repositories was accessed by a third party.
Read more
Recent Comments