Cybersecurity specialists revealed the finding of cross-site scripting (XSS) vulnerability in Apache Velocity Tools that could be exploited by threat actors to compromise U.S. government websites. A Cross-site Scripting (XSS) allows attackers to inject a script into a

Read More

Our new Knowledge Series brings together a group of previous posts for easier access to learning on relevant IT topics. First off is Data, BI and Analytics. MIT Cosmologist, Max Tegmark, has formulated the Mathematical Universe Hypothesis (MUH)

Read More

This report provides insights into vulnerabilities and vulnerable assets that may be found in your environment. Use this report to gain insights into the effectiveness of your vulnerability management, help prioritize your efforts, and focus on specific areas

Read More

The deadly attack at Capitol Hill is one of the most serious cybersecurity events that happened in history along with the ongoing recent SolarWinds Attacks. During these riots, cyber threat-actors were able to get access to the government’s

Read More

The Federal Bureau of Investigation (FBI) has issued a Private Industry Alert about Egregor ransomware attacks' growing threat. The bad actor has already claimed 150 victims worldwide since the group emerged in September.Egregor operates as a ransomware-as-service model

Read More

This report provides insights into vulnerabilities and vulnerable assets that may be found in your environment. Use this report to gain insights into the effectiveness of your vulnerability management, help prioritize your efforts, and focus on specific areas

Read More

There are compelling benefits of performing cybersecurity exercises especially by running a security drill that can help to identify an organization’s weakness and strength. The recent Solarwinds Orion Security Breach is a great example that no one is

Read More

This report provides insights into vulnerabilities and vulnerable assets that may be found in your environment. Use this report to gain insights into the effectiveness of your vulnerability management, help prioritize your efforts, and focus on specific areas

Read More

The Solar wind Supply chain attack is believed to be one of the biggest global cyberattacks that targeted the US government, its agencies, and many private organizations. SolarWinds sells software that lets organizations monitor their computer networks. The

Read More

The volume of cyber threats has increased rapidly! In the last decade, the threat landscape became more diverse, and cybercriminals are working very hard to discover new attacks and improve old ones. Darktrace, a cybersecurity company based in

Read More

With 2020 around the corner, the winning question is:What will the cybersecurity landscape look like for enterprises?This year has taken away a lot, but it also has left us invaluable lessons. "Be aware, Be Prepared." seems to be

Read More

Hopefully, we all are ready for the Covid-19 Vaccine Phishing Scam!  Are you aware of cyber scammers and hackers’ overblown scams during the initial phases of the COVID-19 pandemic? Do you know they are exploiting the Coronavirus Vaccine

Read More