Agent 1433: remote attack on Microsoft SQL Server
All over the world companies large and small use Microsoft SQL Server for database management. Highly popular yet insufficiently protected, this DBMS is a...
Your Business is Compliant with Data Security Regulations. It’s Still not Safe.
There has been plenty of discussion about the impact of global data regulations on data security practices. Particularly with the implementation of the EU’s...
IT threat evolution Q2 2019
Targeted attacks and malware campaigns
More about ShadowHammer
In March, we published the results of our investigation into a sophisticated supply-chain attack involving the ASUS Live...
FW: [Case Study] Automated Change Management
Tripwire, Inc.
Six Security Controls to Prevent Your Cloud from Getting Hacked
Six Security Controls to Prevent Your Cloud from Getting Hacked #outlook a{...
Top 3 PAM Features that Set Centrify Zero Trust Privilege Apart for Cloud Migrations
Ask any sales person what the most common question they get from prospects is, and the answer will typically be the same: “What makes...
Recent Cloud Atlas activity
Also known as Inception, Cloud Atlas is an actor that has a long history of cyber-espionage operations targeting industries and governmental entities. We first...