
“Sapped” Critical Vulnerabilities are Exploited in SAP Applications
Cyber security firm, Onapsis, has warned of 6 critical vulnerabilities being actively exploited in the [...]
“Offroad” Vulnerable Dell Drivers Endangers Millions of Systems
Older Dell users should be aware of a vulnerable driver that has been pushed out [...]
Password Manager Hacked to Deploy Malware on Customer Systems
A currently unidentified threat actor has compromised the update mechanism of Passwordstate, a password manager [...]
Affirm the Security of Your Services with SOC 2
Risk Crew, the elite group of information security governance, risk & compliance experts, and the [...]
Cyber Supply Chain Risk Management – Should Penetration Testing be Required?
Let us begin by describing how to approach Cyber Supply Chain Risk Management (C-SCRM) and [...]
120 Compromised Advertisement Servers Put Millions of Internet Users at Risk
An ongoing “malvertising” campaign dubbed “Tag Barnakle” was identified as the breach point of more [...]
What’s the difference between SOC 1, 2 and 3?
What is a SOC? The difference between SOC 1, 2 and 3 is quite important [...]
Shut Down the 5 Deadliest Web Application Attack Vectors
Web applications are an essential component of any modern business. They can help convey the [...]
FBI & CISA Warning – FortiOS Vulnerabilities are Actively Exploited
APT’s exploit Fortinet FortiOS vulnerabilities to compromise systems belonging to government and commercial entities, warn [...]