Blog

Blog

Reduce Virus Spread with QIBM_QP0L_SCAN_OPEN and QIBM_QPWFS_FILE_SERV

The data below is taken from the 2021 State of IBM i Security Study, which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here. ...
Blog

What Is NVMe?

NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
Blog

Five Steps for Successful IBM i Role Swaps

Your high availability solution is only as solid as your role swaps. You can’t be certain that your systems are switch-ready unless you test. Follow these steps to start testing your role swaps regularly.
Blog

Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability

Microsoft Exchange Server Remote Code Execution (RCE) VulnerabilityOn Tuesday, March 2nd, Microsoft released an out-of-band security update to mitigate four zero-day vulnerabilities that were observed being exploited in the wild against Microsoft Exchange Servers. A server-side request forgery (SSRF) being tracked as CVE-2021-26855 is the likely initial access for attackers. Exploitation of this...
Vulnerability Research

NETSHIELD Corporation Nano 25 Vulnerability

We are disclosing a vulnerability identified in NETSHIELD Corporation Nano 25. The engineers at NETSHIELD Corporation were prompt in their response when notified of the flaw and have provided a patch for the cyber security issue.NETSHIELD Corporation has released a patch for the affected Nano 25 version 10.2.18.Fortra VM will not include an explicit check for this vulnerability due to the...
Vulnerability Research

Microsoft Defender Zero-Day Remote Code Execution (RCE) Vulnerability

Microsoft Defender Zero-Day Remote Code Execution (RCE) VulnerabilityOn Tuesday, January 12th, Microsoft released a patch for an RCE vulnerability present within their antivirus solutions, Windows Defender, System Center Endpoint Protection, and Security Essentials. his vulnerability is being tracked as CVE-2021-1647. Although an exploit has not been publicly released, this vulnerability is...
Blog

Win at Remediation with Quality over Quantity

Win at Remediation with Quality over Quantity VM plan Managing Vulnerabilities Effectively Requires a Quality Over Quantity MindsetBusiness networks will always play host to a number of vulnerabilities. Factor in the current proliferation of endpoints and growing network complexity and you have a list of vulnerabilities that is growing exponentially. The number of reported vulnerabilities has...
Blog

Palo Alto Networks Cortex XSOAR: Prioritizing and Accelerating Remediation of Systems

Vulnerability management and threat assessment solutions provide the first line of defense in protecting assets across an organization, yet today’s widely deployed solutions are outdated in terms of providing an accurate real-time assessment of today’s complex hybrid-cloud environments. In addition, the majority of legacy solutions fail to prioritize the remediation of risky assets or even assets...
Blog

Zyxel Hardcoded Backdoor Account Vulnerability

Zyxel Hardcoded Backdoor Account VulnerabilityOn December 23rd, 2020, the Dutch security firm Eye disclosed a hardcoded backdoor account within the firmware 4.60 on Zyxel Firewalls and AP Controllers. The credentials for this account cannot be changed or altered unless the firmware is patched. These hardcoded credentials provide access to both SSH and web admin interfaces, where additional...
Blog

What is Vulnerability Scanning and How Does it Work?

Businesses of all sizes have some form of data that a threat actor could exploit. It is even possible for a cyber-criminal to invade a company's available network with the sole purpose of causing web security testing issues. Whether it involves patient medical histories, credit card data, available consumer transaction histories, or trade secrets, if a company uses technology to transmit or store...
Blog

Internal vs. External Vulnerability Scans

As a merchant, you are likely familiar with the strict Payment Card Industry Data Security Standard (PCI DSS) requirements set by the PCI Security Standards Council (SSC). Failure to adhere to PCI compliance standards creates vulnerabilities within your business’s network that could result in a loss of sensitive credit cardholder data from consumers and malicious intrusion into your business...
Blog

Everything You Need for PCI Compliance Scan Success

Do you own a business that stores, processes, or transmits sensitive data such as credit card information online? If so, you must comply with the Payment Card Industry Data Security Standards (PCI DSS), a set of 12 main regulations to protect customer data. The PCI Security Standards Council compiled the PCI DSS. The council’s members consist of major card companies, including MasterCard, Visa,...