Log4j flaw: Nearly half of corporate networks have been targeted by attackers trying to use this vulnerability
Cybersecurity researchers warn on the growing pace of scans and attempted attacks looking to exploit the Java logging library security flaw. The number of attacks aiming to take advantage of...
CISA releases advisory on five Apache HTTP server vulnerabilities affecting Cisco products
The government agency urged administrators to review Cisco’s advisory and apply the necessary updates. CISA has released a second advisory about several Apache HTTP server vulnerabilities. Cisco sent out a notice about the vulnerabilities...
Hackers are targeting this Microsoft Windows Installer flaw, say security researchers
The flaw can be exploited to give an attacker administrator rights on a compromised system, despite efforts to fix the problem. Hackers have already created malware in a bid to...
CIOs to play key role in US cybersecurity strategy
Former US CISA director Chris Krebs outlined the intent of the Biden administration’s cybersecurity executive order — and stressed the importance of a robust response from CIOs across all sectors....
Ransomware: Cyber criminals are still exploiting these old vulnerabilities, so patch now
Years-old security vulnerabilities remain a common attack method for ransomware attacks because organizations aren’t applying the patches to fix them. Some of the cybersecurity vulnerabilities most commonly exploited by cybercriminals...
MSRT vs. MSERT: When to use each Windows malware tool
The Windows Malicious Software Removal Tool (MSRT) and the Microsoft Safety Scanner (MSERT.exe) do more or less the same thing: scan for and remove Windows malware. We explore and explain...
Cisco patches three critical holes in IOS XE software
Cisco patches weaknesses in wireless, SD-WAN and IOS XE configuration software. Cisco has patched three critical security holes in its IOS XE software that’s used across a variety of its...
Why email is still the most significant vector that attackers exploit
The impact of the pandemic is spoken about every day. Never before have we had to react to a danger such as COVID. However, we’re now seeing more repercussions develop...
What is firewall as a service?
So what’s firewall as a service? Firewall as a service, or FWaaS, relies on technology in the cloud. A user or application connects to the FWaaS via the internet, and...
Security blind spots persist as companies cross-breed security with devops
As devops matures into devsecops, cultural obstacles continue to exert drag. Devops has become common in software-development organizations around the world, but many companies are still struggling with cultural issues that...