Latest News
Stay up to date with the latest posts and updates
Alerts
-
Best Practices for Cisco Device Configuration
In recent incidents, CISA has seen malicious cyber actors acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart…
4 min read
-
Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory
Today, CISA—in partnership with the Federal Bureau of Investigation (FBI)—released an update to joint Cybersecurity Advisory #StopRansomware: Royal Ransomware, #StopRansomware: BlackSuit (Royal) Ransomware. The updated advisory provides network…
4 min read
-
Defending the Edge Podcast, Episode 21: Unveiling the Mask, The Many Faces of Hacking
Red hat, blue hat, grey hat, black hat; follow along as we dive into the world of hackers on episode 21 of the Defending the Edge Podcast with…
4 min read
-
Emerging Threat Review: Storm-0324 & Sangria Tempest
The newest set of tactics, techniques, and procedures (TTPs) from Storm-0324, otherwise known as DEV-0324, reveals their use of Microsoft Teams to deliver malware through phishing messages and…
4 min read
-
Vulnerability Summary for the Week of July 29, 2024
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source & Patch Info Apache Software Foundation–Apache SeaTunnel Web Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is…
4 min read
-
Understanding 2FA vs MFA: A Layered Approach to Cybersecurity
In today’s digital landscape, ensuring robust security measures is paramount. With the ever-increasing sophistication of cyber threats, businesses and individuals alike must adopt rigorous authentication protocols. Two primary…
4 min read