Attackers have begun to deploy ransomware on Microsoft Exchange Servers compromised by the ProxyLogon exploits.
Read moreMetadata Left in Security Agency PDFs
March 12 2021
Really interesting research:
“Exploitation and Sanitization of Hidden Data in PDF Files”
Abstract: Organizations publish and share more and more electronic documents like PDF files. Unfortunately, most organizations are unaware...
Read more
F5 BIG-IP and BIG-IQ have multiple critical vulnerabilities that enable attackers to completely compromise systems.
Read moreAn analysis of 50 vulnerabilities finds a spectrum of risk, from widespread vulnerabilities exploited by a variety of attackers to serious issues that will likely be exploited in 2021.
Read moreMolson Coors Beer Operations Halted by Hack
March 11 2021No details yet disclosed on the cyberattack.
Read moreIs XDR Right for Your Organization? 6 Questions to Ask
March 11 2021Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?
Read moreDoes XDR Mark the Spot? 6 Questions to Ask
March 11 2021Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?
Read moreMicrosoft Exchange Server Exploit Code Posted to GitHub
March 11 2021The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.
Read moreActionable Tips for Engaging the Board on Cybersecurity
March 11 2021Up your game with your company's board of directors to help them understand your cybersecurity priorities.
Read moreCaveat utilitor! Caveat emptor! Caveat programmator!
Read more
Recent Comments