Threat actors started exploiting a critical Oracle E-Business Suite flaw, tracked as CVE-2022-21587, shortly after a PoC...
Day: February 3, 2023
Even though Google Cloud revenue growth showed signs of slowing, it nevertheless provided something of a bright...
A data retention policy is the first step in helping protect an organization’s data and avoid financial,...
Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the...
A Hacker’s Mind will be published on Tuesday. I have done a written interview and a podcast...
Apply these nine tips to proactively fight fraudulent websites that steal customers’ trust, money, and personally identifiable...
What is cyber threat intelligence and how are businesses leveraging it today? Does it have reactive or...
How Does Cyber Threat Intelligence Relate to Attack Surface Management or Digital Risk Management?
1 min read
If you’re looking at the latest cybersecurity solutions, associated with “categories/buzzwords” like attack surface management, digital risk...
In a previous article, we talked about the core differences (and similarities) between SOAR and XDR. And...
The new loaders also leverage obfuscated virtualization techniques to avoid detection