Blogs

Second Round of Stimulus Provides New Opportunity for Online Scams
This week, Americans nationwide will begin receiving their second round of COVID-related stimulus checks. And just like with the first round, online scammers and malicious actors will no doubt be attempting to scam them out of their money.

Sunburst: A Week in Review
2020 isn’t going down quietly, and what an awful week it has been for the security community. If you were lucky enough to be on vacation, let’s catch up.

Weighing the Value of Managed Security
A shortage of skilled personnel is one of the most serious issues affecting security managers today. Add in challenges in maintaining a complete Security Operations Center (SOC) and the result can be gaps in cyber defense. Managed Detection and Response (MDR) services offer a viable, economical way to counter these drivers of risk.

Death to Vulnerability Management As We Know It
Vulnerability Management concepts are changing. The idea that vulnerability management is limited to scanning alone is being replaced with a wider and more comprehensive view. It’s now transforming to a concept called vulnerability identification, which is an umbrella for any type of service or activity centered around identifying vulnerabilities.

Steps Educational Institutions Are Taking to Defend Their Infrastructures from Cyber Attackers

Just when we thought 2020 couldn’t get any worse, cyber attackers are finding new ways to capitalize on our highly technology-dependent society.

Once More Unto the Breach: An Exploration into Breach Prevention and Response

Organizations continue to learn the hard way that cybersecurity breaches can happen for many reasons at companies of any size and maturity level.

Multiple Vulnerabilities Discovered in Aviatrix

Versions Tested:

The Democratization of Security: Simplification and Direction for Content Management
Last week, we talked about how life could be made easier through the democratization of security permissions and access. In particular, we discussed how Microsoft Azure Active Directory (AAD) simplifies user onboarding. There’s a second component to the Democratization of Security that can take this streamlining process even further.

Local Privilege Escalation Vulnerability Discovered in VMware Fusion
Summary:
VMware Fusion contains a local privilege escalation vulnerability that allows an attacker to inject a malicious path into the system-wide PATH environment variable.
Versions Tested:
VMware Fusion Professional v15.5.5

The Democratization of Security
How Permissions Elevate both Transparency and Efficiency to Build Healthier Security Relationships

Electronic Voting: 3 Ways to Strengthen Election Security
It is no secret that wildly different political views aside, the threat of foreign and even domestic interference in the 2020 U.S. presidential elections is dominating our politics in advance of November.
At its core, the subject of election security comes down to one key question: How secure is your vote?