top of page
Jul 24, 2022
Minimizing the RDP attack vector with Microsoft Account Lockout Policy
A long overdue change in Microsoft Windows: account lockout policy turned on by default.
Jul 22, 2022
Log4j vulnerability: the view from US Cyber Safety Review Board
Back in 2021, a catastrophic flaw in the Log4J library forced many to patch their critical systems. Now, the US government is weighing in.
Jul 22, 2022
Phishing attacks now target MFA enabled MS365 accounts
Innovations in phishing kits now enable bypass of MFA authentication, as shown in Microsoft's assessment of a successful campaign.
Jul 21, 2022
Healthcare organizations targeted by Maui ransomware
Ransomware providers and legitimate companies cover different market niches. In the case of the Maui ransomware, it's about healthcare.
Jul 21, 2022
Businesses lack visibility into their endpoints
As cyberattacks increase, organizations are under pressure to implement effective endpoint management solutions and tackle agent sprawl.
Jul 20, 2022
PayPal phishing kit added to hacked WordPress sites for full ID theft
By misusing the PayPal logo and design, the phishing kit steals user credentials and more.
Jul 20, 2022
Automation: the future of Security operations centers (SOCs)
More frequent and sophisticated attacks challenge organizations to manage IT security while containing costs and using overburdened staff.
Jul 19, 2022
Firmware vulnerabilities, this time Lenovo
Firmware vulnerabilities are usually ignored by patching policies in organizations, potentially allow unrestricted access to endpoints.
Jul 19, 2022
Hackers successfully use Brute Ratel C4
Attackers start using Brute Ratel C4 to avoid detection, as alternative to Cobalt Strike
bottom of page