Log4j (CVE-2021-44228) RCE Vulnerability Explained

Log4J Library Zero-Day Breakdown: Analysis and Remediation

|
Note: this blog has been updated on December 20, 2021, and we will continue to make updates as more technical information becomes available Exploit Background The Log4j exploit is a vulnerability in an open source Apache logging framework that allows attackers to gain arbitrary execution abilities on an affected device ... Read More

How to Protect Yourself from Ransomware on a Budget

|
Ransomware is here to stay. It is one of the most direct ways for criminals to monetize cyberattacks, and small and mid-sized enterprises (SMEs) across the spectrum have experienced a marked uptick in attacks. All organizations across every industry should assume an imminent attack and prepare accordingly, but how to ... Read More

Social Deficit: Automating Against Social Engineering

|
As I stepped into the crowded conference hall at the Mandalay Bay hotel in Las Vegas, I felt a wave of familiarity wash over me. Hundreds of faces, familiar and unfamiliar, produced an excited din in anticipation. At the front of the hall on a small stage sat the equivalent ... Read More

PrintNightmare Breakdown: Analysis and Remediation

|
Exploit Background At the start of this month, a proof of concept for a Microsoft print spooler vulnerability rocked Windows admins, causing a clamor to contain the worst of the damage. This vulnerability is covered under CVE-2021-34527. Originally beginning as a marked ‘low severity’ vulnerability, a proof of concept showed ... Read More