Blog

Blog

Infographic: the History of the Signature

We’ve come a long way from scratching marks and painting scenes on the inside of caves. Today, everyone has a signature. We sign everything from legal documents, to restaurant receipts and package delivery forms. It wasn’t always like this. Check out the full history of the signature. ...
Vulnerability Research

Zero Day Threats Found in Enterprise Application

Two zero-day vulnerabilities found in the Lexmark Markvision Enterprise application that our Vulnerability Research Team discovered and brought to the attention of Lexmark. Lexmark has worked diligently with Fortra to understand, resolve and verify the fixes for these security issues. Lexmark has released fixes. To obtain Markvision Enterprise v2.4.1 visit: https://www.lexmark.com/markvision...
Vulnerability Research

Zero-Day Alert: Email Security Platform Details

Vendor: DellProduct: SonicWALL Email Security (virtual appliance)Version: 8.3.0.6149 Summary Information:SonicWALL Email Security can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and has spam protection, compliance scanning, anti-malware and anti-virus capabilities. The affected web interfaces for these vulnerabilities are frequently available on externally accessible perimeter...
Vulnerability Research

Vulnerabilities Found in the Dell EMC VMAX Management Product Family

The Digital Defense, Inc. Vulnerability Research Team (VRT) has identified six previously undisclosed security vulnerabilities found in the Dell EMC VMAX Management Product family. Summary information for these flaws can be found below.Checks for the identified vulnerabilities are available now in Frontline™ Vulnerability Manager. Clients are encouraged to run a full vulnerability assessment which...
Vulnerability Research

Zero-Day Alert: Multiple Vulnerabilities Within the EMC VMAX

Today Digital Defense is publishing six zero-day vulnerabilities found in the Dell EMC VMAX Management Product family that our vulnerability research team discovered and brought to the attention of Dell EMC. Dell EMC has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Dell EMC has...
Blog

Eight Ways to Avoid Becoming Phish Bait

Is your organization capable of defending against today’s phishing attacks? Social Engineering requires very little to no knowledge of information technology or cutting-edge applications. All an attacker needs is a target and a crafty email to prey on weaknesses in human behavior.Don’t Take the Bait! Tips to Help Defend Against a Phishing AttackBe suspicious of emails asking you to “verify” your...
Blog

Veritas InfoScale Operations Manager Vulnerabilities

Today, Fortra is publishing two zero-day vulnerabilities found in the Veritas InfoScale Operations Manager that our vulnerability research team discovered and brought to the attention of Veritas. Veritas has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Veritas has released fixes for...
Blog

IT Risk Mitigation

It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks. You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least. And it's matched by skyrocketing consumer demand for and reliance on online services. Bottom line: outages are more dangerous to a company...