The Hedgehog Defense #2: Defend Against Automatically Mounted Disk Images
Learn how threat actors abuse a default Windows feature to trick users into running malicious software and what you can do to protect your environment.
Read MoreBlumira Awarded 2024 TMCnet Remote Work Pioneer Award
Blumira has been named as a 2024 winner of the TMCnet Remote Work Pioneer Award, which honors companies whose software supports remote work.
Read More5 Ways to Counteract Increasing Cyber Insurance Rates
Cyber insurance premiums are skyrocketing. Learn five ways to proactively strengthen security, reduce risks, and lower costs to obtain affordable coverage.
Read MoreCritical ScreenConnect Vulnerabilities Allow Remote Code Execution
Two critical vulnerabilities identified in ScreenConnect web server instances that could lead to remote code execution. Patch immediately!
Read More4 Cyberattacks on State/Local Government and What We Can Learn from Them
Overview of 4 recent government cyberattacks supplemented with analysis of the respective situations, and lessons learned from each instance.
Read MoreDemystifying NIST CSF: A Guide to Small Business Cybersecurity
Learn how the NIST Cybersecurity Framework can help small businesses leverage the framework to reduce risk.
Read MoreFortinet Vulnerabilities in FortiOS sslvpnd and fgfmd Lead to RCE
Fortinet details two new, critical vulnerabilities that result in remote code execution. Patch immediately!
Read MoreAnyDesk Suffers Cyberattack
AnyDesk production systems breached in recent cyberattack. Signing certificates and source code stolen. Is AnyDesk safe to use?
Read MoreIvanti Connect Secure VPN & Policy Secure Vulnerabilities
A collection of 4 different vulnerabilities on Ivanti VPN appliances have been released and are actively being exploited.
Read MoreNavigating the Complex XDR Landscape: A Guide for SMBs
With many XDR solutions now available, SMBs face a complex decision on choosing the right platform. In this guide, learn the pros and cons of each approach.
Read More