Ivantis EPM-Systeme anfällig für Angriffe
Unternehmen sollten ihre EPM-Systeme von Ivanti so bald wie möglich patchen, da dort schwerwiegende Sicherheitslücken entdeckt […]
How to justify your security investments
In modern corporate environments, investments in security technologies are no longer judged solely on technical maturity. […]
Mit MXDR gegen den Fachkräftemangel
Mit dem Einsatz von MXDR können Unternehmen ihr IT-Security-Team durch Experten erweitern und deren Expertise nutzen. […]
Fortinet admins urged to update software to close FortiCloud SSO holes
Admins using FortiCloud SSO (single sign on) to authenticate access to Fortinet products are urged to […]
Making cybercrime illegal won’t stop it; making cybersec research legal may
Hacking into computer systems is illegal in many countries — even if you’re a cybersecurity researcher […]
Hidden .NET HTTP proxy behavior can open RCE flaws in apps — a security issue Microsoft won’t fix
Researchers uncovered an unexpected behavior of HTTP client proxies when created in .NET code, potentially allowing […]
Automated Endpoint Security Solutions: How Do They Reduce Threats?
Key Takeaways Automated endpoint security cuts out the delays that kill manual approaches. Machine learning, behavioral […]
How can staff+ security engineers force-multiply their impact?
Staff+ engineers play a critical role in designing, scaling and influencing the security posture of an […]
Hundreds of Ivanti EPM systems exposed online as critical flaw patched
Ivanti has patched a critical vulnerability in Endpoint Manager that enables attackers to hijack administrator sessions […]
Behind the breaches: Case studies that reveal adversary motives and modus operandi
In today’s threat landscape, it’s no longer enough to focus solely on malware signatures and IP […]