Our news
-
Free Cyber Threat Assessment
What’s Included in Your Free Cyber Assessment? Why Choose DefendEdge? How It Works Get Your Free Assessment Today Don’t wait until it’s too late. Take proactive steps to protect your business by understanding your cybersecurity vulnerabilities. Your Trusted Advisors Request Your Free Cyber Threat and Vulnerability Assessment What Our Clients Say “DefendEdge’s free assessment opened…
-
Protect Your Business
— Cutting-Edge Solutions Stay Ahead of Cyber Threats with DefendEdge Protect Your Business with DefendEdge Managed Security and Cyber Threat Intelligence Services In today’s digital landscape, protecting your business from cyber threats is more critical than ever. DefendEdge provides comprehensive managed security services and advanced cyber threat intelligence to safeguard your business and ensure you…
-
Vulnerability Summary for the Week of May 13, 2024
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source & Patch Info 8theme–XStore Core Improper Privilege Management vulnerability in 8theme XStore Core allows Privilege Escalation.This issue affects XStore Core: from n/a through 5.3.8. 2024-05-17 9.8 CVE-2024-33552audit@patchstack.com 8theme–XStore Core Unrestricted Upload of File with Dangerous Type vulnerability in 8theme XStore Core.This issue affects XStore Core:…
-
Rockwell Automation Encourages Customers to Assess and Secure Public-Internet-Exposed Assets
Rockwell Automation has released guidance encouraging users to remove connectivity on all Industrial Control Systems (ICS) devices connected to the public-facing internet to reduce exposure to unauthorized or malicious cyber activity. Users and administrators are encouraged review the following Rockwell Automation notice for more information: SD1672: Rockwell Automation Reiterates Customer Guidance to Disconnect Devices from…
-
The Dark Web: Exploring Hidden Dangers and Cybercrime Networks
In the vast expanse of the internet lies a hidden realm known as the dark web. As opposed to the surface web, which the average person uses daily, it operates on a deeper level of concealment — nurturing a convolution of illegal doings alongside networks focused on cybercrime. Often depicted as being mysterious and dangerous,…
-
Royal Tiger – The First Officially Designated Robocall Threat Actor
On Monday, May 13th, the Federal Communications Commission (FCC) officially named its first robocall threat actor group,’ Royal Tiger’. This move goes along with the FCC’s new robocall bad actor classification system, Consumer Communications Information Services Threat (C-CIST). This system aims to assist law enforcement and industry partners with tracking threat actors behind robocall campaigns. Royal Tiger is comprised of members operating…
-
Fortinet Services Expert Partner
Security Products & Solutions Our teams deploy Fortinet’s cutting-edge technologies around the globe When you need reliable Fortinet Services and Support, we are your choice for rapid and best practice services. “Having so many standalone firewalls out in the field we have to know they are built securely and reliably. As the health care industry…
-
CISA and Partners Release Guidance for Civil Society Organizations on Mitigating Cyber Threats with Limited Resources
CISA, in partnership with the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI) and international partners, released Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society. The joint guidance provides civil society organizations and individuals with recommended actions and mitigations to reduce the risk of cyber intrusions. Additionally, the guide encourages…
-
Vulnerability Summary for the Week of May 6, 2024
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source & Patch Info academy_lms — academy_lms Missing Authorization vulnerability in Academy LMS.This issue affects Academy LMS: from n/a through 1.9.16. 2024-05-06 7.1 CVE-2024-33912audit@patchstack.com brevo_for_woocommerce — sendinblue_for_woocommerce Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Brevo for WooCommerce Sendinblue for WooCommerce.This…
-
Guarding Against Android Cyber Threats
When thinking about security measures to fight against malicious activity, rarely do people consider cellular security on the same level as network security. Social engineering techniques used by threat actors including phishing, vishing, and smishing should not be the end of where protection for mobile devices stops at. Identity theft and other types of exploits…