Blog

Vulnerability Research

Patch Tuesday Update - August 2023

Today’s Microsoft Security Update includes the Microsoft Patch Tuesday checks in the NIRV 4.26.0 and Fortra VM Agent 1.63.0 releases.Microsoft included fixes for 74 vulnerabilities in this release, including 6 rated as Critical.Microsoft also released 2 security advisories this month with improvements related to defense in depth for Microsoft Office and the Memory Integrity System Readiness Scan...
Blog

INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks

Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
Blog

Evolve Your Security Strategy to Prepare for DORA

Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Blog

Patch Tuesday Update - July 2023

Today’s Microsoft Security Update addressed 130 vulnerabilities, including 9 that are rated as Critical. This is double the number fixed from last month, June 2023.Microsoft included two security advisories this month, ADV230001 and ADV230002.The ADV230001 security advisory addresses some drivers that were certified by the Microsoft’s Windows Hardware Developer Program (MWHDP) that have been used...
Blog

Remote Code Execution Vulnerability in IBM i CVE-2023-30990

Fortra’s Vulnerability Research Team (VRT) has provided a scan check for CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service in Fortra VM.Per an IBM security bulletin, IBM i is vulnerable to a remote attacker executing arbitrary unauthenticated CL commands as a QUSER, a workstation user role without special authorities, due to weak error handling in the DDM architecture.IBM i DDM...
Blog

Supply Chain Risk

The supply chains of today’s global economy rely heavily on technology and information systems to deliver finished goods and services to the end user. However, for all the benefits of a hyperconnected economy this introduces, supply chains also carry with them a high degree of risk.
Blog

Cyber Insurance - Assessing Risks and Securing Your Future

Cyber insurance is not the most glittering side of cybersecurity, but it has certainly earned its place in today's security debate. According to Statista, as of 2021, an average of 48 percent of organizations in selected countries worldwide had cyber insurance, with numbers being slightly higher for countries such as the U.S. (50 percent), Sweden (55 percent), and Austria (66 percent). Current...
Blog

Infosecurity Europe 2023 – That’s a Wrap!

Infosecurity Europe has closed its doors for another year. The aftermath of these events can be a strange time; still reeling from the chaos of the show floor and nursing feet unaccustomed to such intense use, it’s often difficult to make sense of everything we’ve learned.
Blog

Fostering a Top-Notch Customer Experience

As VP of Customer Operations, Amy Vogsland is all about customer experience. She leads a global department of 100 people who have exquisite attention to detail on all matters related to accounts, renewals, invoicing, and licensing.
Blog

Low Code vs. No Code Automation

All automation tools are not created equal. Some require great technical skills to build and manage automation, leaving many business users unable to reap the benefits of this advanced technology. However, there are tools and solutions that enable anybody to set up automated workflows that boost productivity and save time. These no-code and low-code tools bring automation to everyone—no matter...
Vulnerability Research

Patch Tuesday Update - June 2023

Today’s Microsoft Security Update addressed 78 vulnerabilities, including 6 that are rated as Critical. None of the vulnerabilities included in the Patch Tuesday release appear to be currently exploited in the wild.Of note, Microsoft SharePoint Server Elevation of Privilege Vulnerability (CVE-2023-29357) appears to allow an attacker to bypass authentication using a spoofed JWT authentication token...