Endpoint February 20, 2018 The Art of Disclosing Your Incident Response Strategy to the Public 4 min read - As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
January 22, 2018 Migrating to SAP HANA? How Can You Ensure Security of Your Business-Critical Data? 2 min read - The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.
Advanced Threats January 3, 2018 CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data 6 min read - A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
Fraud Protection December 26, 2017 Beware of the Latest Punycode Attacks 2 min read - In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.
December 7, 2017 Security Vulnerabilities in RFC-1342 Enable Spoofing and Code Injection Attacks 2 min read - Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.
November 30, 2017 Older Office Cybersecurity Vulnerability Exploited by Cobalt Attackers 2 min read - Fraudsters have used the MS Office Equation Editor cybersecurity vulnerability to craft an attack on financial institutions and users.
November 25, 2017 Managing Security Risk in the Face of Intel ME Vulnerabilities 5 min read - On November 22, Intel Corporation confirmed security vulnerabilities relating to Intel Management Engine (ME), Intel Server Platform Service (SPS),...
November 16, 2017 Security Patches Help IT Managers Address Microsoft Vulnerability 2 min read - Microsoft released security patches to deal with a 17-year-old flaw that could be exploited to remotely initiate malicious code on all Windows versions.
Network November 9, 2017 Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes! 3 min read - There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.
November 7, 2017 Anonymity Gone Awry: New TorMoil Vulnerability Leaks User IPs 2 min read - A new vulnerability called TorMoil exploits a browser flaw to bypass security relays and expose real IP addresses belonging to Tor users.