News & Updates
No items found.
BD Synapsys

BD Synapsys

This advisory contains mitigations for an Insufficient Session Expiration vulnerability in the BD Synapsys microbiology informatics software platform.

Read More

The value of cyber insurance for small businesses

The value of cyber insurance for small businesses

Cyber insurance won’t stop a data breach, but it will protect small businesses from the high costs of a security breach or cyberattack.

Read More

4 emerging threats in the domain name landscape

4 emerging threats in the domain name landscape

There are four notable emerging cybersecurity threats in the domain name space organizations need to be aware of for improved brand protection. 

Read More

ISC StormCast for Tuesday, May 31st, 2022
FBI: 61 active shooter incidents occurred in 2021

FBI: 61 active shooter incidents occurred in 2021

In 2021, the U.S. Federal Bureau of Investigation (FBI) designated 61 shootings as active shooter incidents. 

Read More

Are you prepared for the 2022 hurricane season?

Are you prepared for the 2022 hurricane season?

Hurricane season 2022 is almost here, and security leaders throughout the U.S. must review their emergency plans to ensure employee safety and business resilience.

Read More

How the manufacturing sector can protect against cyberattacks

How the manufacturing sector can protect against cyberattacks

There are many cybersecurity resources for manufacturers looking to better protect their facilities from cyber threats like hacking, ransomware and insider threats.

Read More

ISC StormCast for Friday, May 27th, 2022

ISC StormCast for Friday, May 27th, 2022

Huge Signed PE Files
https://isc.sans.edu/forums/diary/Huge+Signed+PE+File/28686/
VMWare Authentication Bypass PoC
https://www.horizon3.ai/vmware-authentication-bypass-vulnerability-cve-2022-22972-technical-deep-dive/
Quanta Server BMC Vulnerability
https://eclypsium.com/2022/05/26/quanta-servers-still-vulnerable-to-pantsdown/
Windows 11 and Server 2022 Update Prevent Trend Micro Ransomware Protection
https://success.trendmicro.com/dcx/s/solution/000291066?language=en_US
Nate Street: Advancing SIEM Log Management Strategies through Vendor-Agnostic Measurement
https://www.sans.edu/cyber-research/38685/

Read More

Key trends in the Verizon Data Breach Investigations Report

Key trends in the Verizon Data Breach Investigations Report

From well publicized critical infrastructure attacks to massive supply chain breaches, the DBIR found five key trends in the security incidents analyzed.

Read More

Load More