The Persistent Threat of Path Traversal Vulnerabilities in Software Development

Path traversal vulnerabilities, or directory traversal, are now subject to a government advisory for obligatory consideration We live in an environment where digital infrastructure is increasingly fundamental to business operations across all ...

Preparing for Holiday Cyberattacks

How can security teams be ready for holiday cyberattacks and a seasonal peak in cybercrime? Holiday cyberattacks are on the rise. The vacation season, be it Christmas, Hanukkah, Easter, St. Patrick’s Day, ...

CVE-2024-2389 in Progress Flowmon Requires Immediate Patching

Navigating the severity of the CVE-2024-2389 vulnerability in Progress Flowmon, and the ramifications (and fix) for enterprise : OFFICIAL CVE-2024-2389 PATCHING INFORMATION : A significant security vulnerability (CVE-2024-2389) has surfaced in Progress ...

The Advantages of Cybersecurity Process Automation

Cybersecurity process automation should be a critical part of any SOC security strategy  As cyber threats become more sophisticated and pervasive, cybersecurity process automation becomes increasingly valuable, as busy cybersecurity teams face ...

Layered Security Elements for Defense in Depth

Using layered security elements for the best possible defense-in-depth cybersecurity approach  Layered security elements, also known as defense-in-depth (DiD), is a cybersecurity approach that uses multiple layers of defense to protect a ...

WordPress Form Plugin Vulnerability CVE-2024-28890 Affecting 500k+ Sites

Urgent patching alert (CVE-2024-28890) lists critical vulnerabilities in Forminator plugin that affect over 500,000 WordPress sites  : OFFICIAL CVE-2024-28890 PATCHING INFORMATION :  WordPress is one of the most popular content management systems ...

JSOutProx Malware Variant Targeting Financial Orgs., Warns Visa

Visa issues alert on the rising threat from JSOutProx malware targeting financial institutions Visa has recently issued a critical security alert concerning a significant uptick in the activity of the particularly hazardous ...

The Importance of a Multi-Layer Security Stack

Multi-layer security is an essential business consideration for the best possible cyber defense  When cyber threats are evolving at an unprecedented pace, multi-layer security has become the best practice, and relying on ...

Satellite Cybersecurity is a Pressing Reality

Satellite cybersecurity has become a pressing issue, with critical infrastructure resting on telecom success  The importance of telecoms and satellite cybersecurity cannot be overstated. In the vast expanse of space, the critical ...

Zero-Day Exploits Surge, Reports Google Threat Analysis Group

Google TAG reports a concerning rise in zero-day exploits for 2023 and the year to come As we enter Q2 of 2024, and looking back with hindsight, 2023 marked a significant increase ...