
Basic Cyber Hygiene, Part 1
Humans are the weakest link in security, and this saying is often repeated for good reason. The majority of cybersecurity incidents are the result of human error on some level.
ProxyLogon and Proof-of-Concept Exploits
As mentioned in the previous blog article, thousands of on-premises Microsoft Exchange Servers were compromised by state-sponsored attackers. The attackers exploited “ProxyLogon”, a set of zero-day vulnerabilities within the software
HAFNIUM, ProxyLogon, and DearCry
We explained what zero-day vulnerabilities and zero-day attacks are in a previous article. New examples were provided early this month. On March 2, Tom Burt, Corporate Vice President of Customer