| Feb 9, 2021 Zero Trust SIEM Strategy (Role of SIEM in Zero Trust Environment) Learn how your Security information and event management (SIEM) aids in mitigating risk as part of your larger Zero Trust Strategy.
| Feb 3, 2021 Heap-Based Buffer Overflow Vulnerability Discovered in Sudo (TIR-20210131) This report is regarding a recently discovered heap-based buffer overflow vulnerability within the widely used Sudo utility.
| Jan 24, 2021 Recent additions to TeamTNT Malware Campaign on Cloud Environments This report is about the recent additions to the TeamTNT malware campaign to infect cloud environments and it is updated to capture AWS IAM user details more effectively.
| Jan 6, 2021 New Golang Worm targets MySQL, Jenkins, Oracle WebLogic and other public services Threat report on the new malware Golang Worm which is targeting services such as MySQL, Jenkins, and Oracle WebLogic.
| Jan 6, 2021 Zyxel Firewall Backdoor Vulnerability CVE-2020-29583 This outlines the TTP for the Zyxel Firewall backdoor vulnerability CVE-2020-29583. It also provides mitigation recommendations.
| Dec 28, 2020 What is Mobile App Testing? Cybersecurity specialists utilize an assortment of tests and techniques to screen for vulnerabilities in order to evaluate the security of a mobile app.
| Nov 16, 2020 PyXie distributing ransomware tools targeting Healthcare, Education, Government and Technology companies This threat report is about bad actor PyXie Group's ransomware tools targeting various sectors including healthcare, education, government, and technology.
| Nov 10, 2020 What you need to know about Telemedicine, HIPAA Compliance and the Pandemic What you need to know about evolving telemedicine policies and HIPAA compliance during this pandemic.
| Oct 30, 2020 3 Scary Stories of Data Breach Disasters 3 data breach stories that could happen to any company and that could've been preventable.
| Oct 27, 2020 TeamTNT Attacks Cloud Environments TeamTNT attacks cloud environments with Weave Scope. This report describes the tactics, techniques, and procedures used and how to defend against them.