How Do I Find My Servers With the Log4j Vulnerability?
This Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
This Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
More than 60 variants of the original exploit were introduced over the last day alone.
The info-stealing malware TinyNuke has re-emerged in a new campaign targeting French users with invoice-themed lures in emails sent to corporate…
The number of bug bounty programs jumped by a third, the median payout for a critical vulnerability report rose to…
Dell's driver fix of the CVE-2021-21551 vulnerability leaves margin for catastrophic BYOVD attacks resulting in Windows kernel driver code execution.…
Most targeted industry shifts from the financial and insurance sector in 2020.
The opening marks the fifth center opened globally, fulfilling a key milestone within the Global Transparency Initiative.
Some tips for effectively combating Web supply chain attacks and customer hijacking via browser extensions.
BOSTON (AP) — A critical vulnerability in a widely used software tool — one quickly...
This Tech Tip outlines how enterprise defenders can mitigate the risks of the Log4j vulnerabilities for the short-term while waiting…