application protection
The Persistent Threat of Path Traversal Vulnerabilities in Software Development
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, vulnerability, zero trust
Path traversal vulnerabilities, or directory traversal, are now subject to a government advisory for obligatory consideration We live in an environment where digital infrastructure is increasingly fundamental to business operations across all ...
Preparing for Holiday Cyberattacks
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, next gen security, Phishing, security, Security Research, vulnerability, zero-day
How can security teams be ready for holiday cyberattacks and a seasonal peak in cybercrime? Holiday cyberattacks are on the rise. The vacation season, be it Christmas, Hanukkah, Easter, St. Patrick’s Day, ...
CVE-2024-2389 in Progress Flowmon Requires Immediate Patching
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, next gen security, security, Security Research, vulnerability
Navigating the severity of the CVE-2024-2389 vulnerability in Progress Flowmon, and the ramifications (and fix) for enterprise : OFFICIAL CVE-2024-2389 PATCHING INFORMATION : A significant security vulnerability (CVE-2024-2389) has surfaced in Progress ...
The Advantages of Cybersecurity Process Automation
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, next gen security, security, Security Research, service account protection, zero trust
Cybersecurity process automation should be a critical part of any SOC security strategy As cyber threats become more sophisticated and pervasive, cybersecurity process automation becomes increasingly valuable, as busy cybersecurity teams face ...
Layered Security Elements for Defense in Depth
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, next gen security, security, Security Research
Using layered security elements for the best possible defense-in-depth cybersecurity approach Layered security elements, also known as defense-in-depth (DiD), is a cybersecurity approach that uses multiple layers of defense to protect a ...
WordPress Form Plugin Vulnerability CVE-2024-28890 Affecting 500k+ Sites
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Security Research, vulnerability, zero trust, zero-day
Urgent patching alert (CVE-2024-28890) lists critical vulnerabilities in Forminator plugin that affect over 500,000 WordPress sites : OFFICIAL CVE-2024-28890 PATCHING INFORMATION : WordPress is one of the most popular content management systems ...
JSOutProx Malware Variant Targeting Financial Orgs., Warns Visa
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, Malware, microsegmentation, next gen security, security, Security Research, vulnerability
Visa issues alert on the rising threat from JSOutProx malware targeting financial institutions Visa has recently issued a critical security alert concerning a significant uptick in the activity of the particularly hazardous ...
The Importance of a Multi-Layer Security Stack
Nik Hewitt | | application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Ransomware, security, Security Research
Multi-layer security is an essential business consideration for the best possible cyber defense When cyber threats are evolving at an unprecedented pace, multi-layer security has become the best practice, and relying on ...
Satellite Cybersecurity is a Pressing Reality
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
Satellite cybersecurity has become a pressing issue, with critical infrastructure resting on telecom success The importance of telecoms and satellite cybersecurity cannot be overstated. In the vast expanse of space, the critical ...
Zero-Day Exploits Surge, Reports Google Threat Analysis Group
Nik Hewitt | | advice, analysis, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero-day
Google TAG reports a concerning rise in zero-day exploits for 2023 and the year to come As we enter Q2 of 2024, and looking back with hindsight, 2023 marked a significant increase ...