In this Tech Tip, SANS Institute’s Johannes Ullrich suggests using PowerShell to identify Windows systems affected by the newly disclosed vulnerability in http.sys.
Read moreOxeye Introduce Open Source Payload Deobfuscation Tool
January 12 2022Ox4Shell exposes hidden payloads thatare actively being used to confuse security protection tools and security teams.
Read moreNew Research Reveals Public-Sector IAM Weaknesses and Priorities
January 12 2022Auth0 Public Sector Index shows that governments are struggling to provide trustworthy online citizen services.
Read moreNew Research Reveals Public-Sector IAM Weaknesses and Priorities
January 12 2022Auth0 Public Sector Index shows that governments are struggling to provide trustworthy online citizen services.
Read moreAn attack campaign detected in October delivers variants of Nanocore, Netwire, and AsyncRATs to target user data.
Read moreWhy Is Cyber Assessment So Important in Security?
January 12 2022All the pen testing and tabletop exercises in the world won't help unless an organization has a complete and accurate understanding of its assets.
Read moreFlashpoint Acquires Risk Based Security
January 12 2022Flashpoint plans to integrate Risk Based Security data and technology into its platform to boost threat intelligence and vulnerability management.
Read moreCritical Infrastructure Security and a Case for Optimism in 2022
January 12 2022The new US infrastructure law will fund new action to improve cybersecurity across rail, public transportation, the electric grid, and manufacturing.
Read moreWormable Windows HTTP hole – what you need to know
January 12 2022One bug in the January 2022 Patch Tuesday list is getting lots of attention: "HTTP Protocol Stack Remote Code Execution Vulnerability".
Read moreBy combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.
Read more
Recent Comments