
HAFNIUM, ProxyLogon, and DearCry
We explained what zero-day vulnerabilities and zero-day attacks are in a previous article. New examples were provided early this month. On March 2, Tom Burt, Corporate Vice President of Customer
Zero-Day Vulnerabilities and Zero-Day Attacks
Every now and then, a zero-day attack will make headlines in the world of cybersecurity. Zero-day attacks exploit zero-day vulnerabilities. According to Ryan Naraine of ZDNet, the Stuxnet worm—discovered in
SUNBURST and Supply Chain Attacks
Recently, a global intrusion campaign has been making headlines. The campaign exploits SolarWinds Orion software, and roughly 18,000 of SolarWinds’ customers have been compromised. This article provides an overview of
Insider Threats and the Principle of Least Privilege
The majority of cybercriminals operate outside of the organizations they target, but some threats come from within the organizations themselves. The Department of Homeland Security defines an insider threat as