How To Navigate Microsoft 365 Audit Logs
Admins can search the unified audit log in Microsoft 365 to detect potentially malicious activity. Here are a few ways to do it.
Read MoreFortinet SSL-VPN RCE Vulnerability (CVE-2022-40684) Exploited In The Wild
A vulnerability in Fortinet (CVE-2022-40684) enables unauthenticated remote code execution (RCE) on devices. Here's what to do.
Read MoreOpenSSL Vulnerability: What You Should Know
A critical vulnerability was discovered in OpenSSL, a popular open source cryptography library. Learn what you should do to protect your organization.
Read More3 Challenges of the New FTC Safeguards Rule
The new Safeguards Rule has nine elements that companies must complete. Here are three requirements that will be challenging for organizations to meet.
Read MoreProduct Update: Duo Detections
We'll break down some of the new detections being released and some updates to existing Duo detection rules.
Read MoreZero-Day Vulnerabilities Found in Microsoft Exchange (CVE-2022-41040 and CVE-2022-41082)
Two zero-day vulnerabilities were discovered in Microsoft Exchange Server 2013, 2016, and 2019. One vulnerability, CVE-2022-41040 is a Server-Side Request Forgery (SSRF) vulnerability; the other, CVE-2022-41082, is a remote-code execution (RCE).
Read More