PuTTY SSH Client Vulnerability Allows Private Key Recovery

| | Blog
The recent discovery of a critical vulnerability in the PuTTY SSH and Telnet client, identified as CVE-2024-31497, has raised significant concerns among IT professionals and developers. Read on to get the details.   Tell me more about the PuTTY SSH client vulnerability  This vulnerability affects versions 0.68 to 0.80 of PuTTY, ... Read More

MDR and EDR – Why One Doesn’t Cancel Out The Other

| | Blog
Strong detection and response capabilities are pivotal for identifying and mitigating threats before they can cause significant damage. As attackers employ advanced tactics that often bypass perimeter defenses, the focus shifts to not only preventing breaches but also quickly detecting and responding to incidents that do occur.    Managed detection and ... Read More

Microsoft’s April 2024 Patch Tuesday: Updates for 150 Vulnerabilities and Two Zero-Days

| | Blog
In a significant security update, Microsoft has released its April 2024 Patch Tuesday updates, which address a hefty 150 vulnerabilities across its suite of products. This update is particularly noteworthy not only for the sheer volume of vulnerabilities it covers but also because it includes fixes for two zero-day vulnerabilities ... Read More

MDR for Better Office 365 Security

| | Blog
Microsoft Office 365 is a stalwart suite of apps that powers collaboration, communication and productivity for companies of all sizes. Companies gravitate toward tools like Exchange Online for email communications, SharePoint for document management and collaboration, Power BI for analytics, and Teams for unified communication and teamwork. Despite the many ... Read More

Mastering MITRE: Enhancing Cybersecurity with Device Log Mapping

| | Blog
In the dynamic realm of cybersecurity, the MITRE ATT&CK framework has become a pivotal tool for organizations striving to fortify their defenses against the myriad of cyber threats that loom in the digital age. The webinar, “The MITRE Touch: Practical Strategies for Mapping Device Logs to MITRE ATT&CK,” hosted by ... Read More

A Primer on SaaS Security Risks

| | Blog
The SaaS (software as a service) model facilitates new, innovative solutions by reducing the need for heavy upfront investments in infrastructure and software development. The model also provides companies that subscribe to SaaS solutions with lower-cost, scalable apps.  It’s important to remember, though, that the convenience and overall benefits of ... Read More

Event Recap: Highlights from Nuspire’s Time at FutureCon Baltimore

| | Blog
The Nuspire team recently attended FutureCon Baltimore, an event that yielded a myriad of meaningful discussions that not only covered the sharing of cybersecurity knowledge, but also delved into the key challenges and pain points cybersecurity professionals face. The one-day conference provided a platform for attendees to discuss and strategize on ... Read More

CISA, NSA, FBI and Five Eyes Issue New Alert on Chinese APT Volt Typhoon 

| | Blog
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA) and their international partners from the Five Eyes alliance have issued a new advisory concerning the activities of the Chinese state-sponsored hacking group known as Volt Typhoon. This group has been implicated ... Read More

Transportation Cybersecurity Threats: An Overview

| | Blog
The transportation sector moves people, goods and services across different parts of the economy and generally keeps things ticking. Like the human circulatory system, its role often gets taken for granted until there’s a problem with it. And an increasingly common cause of transportation system issues is cyberattacks.    When ... Read More

Microsoft’s February 2024 Patch Tuesday Addresses 2 Zero-Days and 73 Vulnerabilities

| | Blog
Microsoft’s Patch Tuesday for March 2024 has once again highlighted the importance of regular updates in maintaining the security of digital environments. This month, Microsoft addressed a significant number of vulnerabilities, including two critical flaws that demand immediate attention. Read on to learn more.   What are the zero-days mentioned in ... Read More

Secure Guardrails