As attackers continue to advance and increase their sophistication levels, legacy email security technologies no longer provide sufficient protection for organizations.
It’s hard to know how many systems are already compromised by the log4j security vulnerability. It may take months or even years until we know if most critical systems were patched in time.
As employees travel during the holidays, many will be taking their work along for the journey. The surge in remote work due to the COVID-19 pandemic means that security professionals must remain vigilant this holiday season.
A new feature in Tesla Model 3 vehicles raises concerns of road safety and asks the question: who is responsible for duty of care when it comes to distracted driving?
Blumira research team has discovered an alternative attack vector in the Log4j vulnerability that relies on a basic Javascript WebSocket connection to trigger the RCE locally via drive-by compromise.
There are strategies for avoiding the downsides of typical micromanagement, however, by following the path of enlightened micromanagement. Here are a few tips.