• Security-Focused Patching Best Practices

    Security-Focused Patching Best Practices

    As cyber threats become more sophisticated and prevalent, organizations of all sizes face an ever-increasing risk of becoming victims. That isn’t hyperbole. Check Point Research found that cyberattacks increased by 38% in 2022, compared to 2021, and weekly attacks increased by 7% in the first quarter of 2023 compared to the same quarter in 2022. While businesses must…

  • The Risks of Poor Patch Management

    The Risks of Poor Patch Management

    We all neglect things we know we shouldn’t, like a yearly physical with a healthcare provider. When the time rolls around, you tell yourself you’ll make an appointment when you’re less busy, that you feel fine so there’s no need, or concoct another story that lets you put off what you know you shouldn’t. While…

  • Log4j Is Still Causing Havoc: What We Learned From Log4Shell

    Log4j Is Still Causing Havoc: What We Learned From Log4Shell

    If you knew you were at risk for diabetes or cancer, you’d take all the necessary precautions to avoid or delay onset. You’d go for routine checkups and tests to ensure that if signs of the disease appear, you could catch it early, treat it, and hopefully avoid a deadly outcome. A company’s cybersecurity health…

  • How SSO can lead to a Pass-The-Hash Attacks

    How SSO can lead to a Pass-The-Hash Attacks

    Apple AirTags. Google Maps. Single sign-on technology. What do these three seemingly random tech advancements have in common? Each was created to make our daily experiences more convenient, yet each has been exploited for evil purposes. Stalkers are using AirTags to track the whereabouts of unsuspecting victims; criminals are plotting attacks and burglaries using detailed…

  • Reverse Proxies Are Killing Your MFA

    Reverse Proxies Are Killing Your MFA

    If you’re old enough to remember landlines (or have seen any 1980s or 90s movie about teens looking to put one over on their parents), chances are your parents pulled a real-world man-in-the-middle attack (MITM) on you. There you were as a sneaky teenager plotting with a friend over the phone about going to a…

  • Phishing with GIFShell in Microsoft Teams

    Phishing with GIFShell in Microsoft Teams

    People love GIFs. We add them to emails, texts, tweets, and Slack chat groups all day long as we chat away with co-workers, friends, and family. We use them as a communication tool to show emotion and convey a tone when a plain text message might fall flat. If a picture says a thousand words,…

Loading

Sign Up for Updates