Action1 patching cyberattacks JumpCloud patching

The Importance of Timely Patching

Yet another new critical vulnerability was uncovered with the discovery that Microsoft Office could be exploited through a malicious Word document and used to run remote code execution. Meanwhile, many old vulnerabilities ...
Security Boulevard
Towards Practical Security Optimizations for Binaries

Towards Practical Security Optimizations for Binaries

By Michael D. Brown, Senior Security Engineer To be thus is nothing, but to be safely thus. (Macbeth: 3.1) It’s not enough that compilers generate efficient code, they must also generate safe ...
Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

How Exploits Work In cybersecurity, the term “exploit” is used to represent a piece of code, data or sequence of commands that takes advantage of… The post Exploits Explained: How Log4j, Buffer ...

Cybersecurity in Competitive Online Gaming (Cheating, Mitigation, and Vulnerabilities)

As the competitive online gaming and eSports industries gain legitimacy by becoming more popular and attracting mainstream attention, the question of competitive integrity lingers in the back of my mind. Can the ...
UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)

UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)

UPDATE 12/17/21: The Logout4Shell Vaccine has been updated to add a persistent option in addition to the existing one which reverted upon server restart. The previous version of the Vaccine used the ...

Apple Sues NSO Group

Piling more on NSO Group’s legal troubles, Apple is suing it: The complaint provides new information on how NSO Group infected victims’ devices with its Pegasus spyware. To prevent further abuse and ...
The CISA Directive Is Crucial for Cybersecurity

The CISA Directive Is Crucial for Cybersecurity

As the CEO of a cybersecurity company, it’s important to stay informed--to know about breaking news, emerging threats, and rising trends to provide direction for the company and protection for our customers ...
NOBELIUM Demonstrates  Why Microsoft Is the Weakest Link

NOBELIUM Demonstrates  Why Microsoft Is the Weakest Link

Microsoft platforms and products are ubiquitous. Government agencies and companies of all sizes and industries around the world rely on Microsoft software to get things done. They are also riddled with security ...