What If a Cybersecurity Black Swan Event Happens?
In Other Words – instead of assuming a risk profile, and assess risks – assume it will happen to you (it is just a matter of time). Now what? In…
Defend Your Systems
In Other Words – instead of assuming a risk profile, and assess risks – assume it will happen to you (it is just a matter of time). Now what? In…
Let us not make the same mistakes as we may have done in the past when it was time to move to a new year. We should review the current…
Affected Software A significant number of Java-based applications are using log4j as their logging utility and are vulnerable to this CVE. To the best of our knowledge, at least the…
Due to an actively exploited zero-day vulnerability: https://thehackernews.com/2021/12/extremely-critical-log4j-vulnerability.html This bug is a 10 of 10 on the CVSS rating from the article a snippet: Tracked as CVE-2021-44228 and by the…
2 stories from the Hacker News: Solar Winds Hackers Targeting Government and Why everyone needs to take the latest CISA directive seriously The Solarwinds hack from last year (the one…