The Power of Cybersecurity Outcome-Driven Metrics (ODMs) for SOCs 

An overview and guide to outcome-driven metrics for cybersecurity teams In cybersecurity, where threats constantly evolve, the stakes are perpetually high, and 2024 hacking techniques are becoming ever more sophisticated, the strategic ...

Zero-Day Exploits Surge, Reports Google Threat Analysis Group

Google TAG reports a concerning rise in zero-day exploits for 2023 and the year to come As we enter Q2 of 2024, and looking back with hindsight, 2023 marked a significant increase ...

The Biggest Misconceptions of Zero-Trust

There are a lot of misconceptions around zero-trust cybersecurity practices, so let’s lay some of them to rest  Zero trust is grounded in the principle of “never trust, always verify.” Despite its ...

CVE-2024-2879: WordPress LayerSlider Vulnerability

Securing our WordPress plugins, the critical CVE-2024-2879 LayerSlider vulnerability, and the importance of bug reporting : OFFICIAL CVE-2024-2879 RELEASE INFORMATION : Within the massive WordPress ecosystem, plugins like LayerSlider play a crucial ...

USENIX Security ’23 – Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation

Authors/Presenters: *Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan Zhang, Yaowen Zheng, Xian Zhan, Xiaofei Xie, Xiapu Luo, Xinghua Li, Yang Liu, Sheikh Mahbub Habib* Many thanks to USENIX for publishing their outstanding ...

USENIX Security ’23 – DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing

Authors/Presenters: *Ming Yuan and Bodong Zhao, Penghui Li, Jiashuo Liang, Xinhui Han, Xiapu Luo, Chao Zhang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...

Macro Segmentation vs. Micro Segmentation

Understanding the distinction between macro segmentation vs. micro segmentation, and making the right choice  Within network security segmentation, macro segmentation vs. micro segmentation are crucial methods to consider for organizations aiming to ...

USENIX Security ’23 – Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren – Demystifying Pointer Authentication on Apple M1

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...

CVE-2023-48788 Vulnerability Reported in FortiClientEMS

Fortinet’s FortiClient EMS product exploited via CVE-2023-48788, a critical SQL injection vulnerability : OFFICIAL CVE-2023-48788 PATCHING INFORMATION : The CISA (Cybersecurity and Infrastructure Security Agency) has alerted organizations to actively exploit ‘The ...