cover

The Data Breaches of 2020

With the massive shift to remote work due to COVID-19 – with upwards of 42% of US employees now working remotely according to Stanford professor William D. Eberle – there’s been an uptick in security breaches. It seems reasonable to expect this trend to continue as working from home is normalized and more employees use personal devices to access the infrastructure necessary to perform their duties.

Here’s a quick rundown of the largest data security breaches from last year:

In: #attack

CVE and CVSS: What's the Difference?

CVE and CVSS are some of the most commonly misunderstood features of patching. In this article, we will explore the differences and showcase how they can affect your patching technique. Although many IT managers are familiar with these terms CVE and CVSS, some IT professionals still don’t understand the difference between them. CVE and CVSS are synonymous with software vulnerabilities, patching and operating systems. 

Predicting Vulnerabilities in Compiled Code

Prognosis: Vulnerability Proliferation

With the increase of software usage worldwide, it’s only natural that a growing number of vulnerabilities will be discovered.

1999 was the inflection point for vulnerability listings. Prior to that, a variety of security tools offered different ways to categorize software security issues. As there was no standardized protocol for listing a vulnerability, inconsistencies were inevitable. In that year, the concept of common vulnerability and exposure (CVE) was introduced as a standard to represent software security flaws.

In: #binary

There was a Drop in Vulnerability Disclosure, What's the Bad News?

As detection of backdoor vulnerabilities to the Android Operating System present increasingly lucrative potential, locating them has now become somewhat of a treasure hunt for hackers.

In: #cpe

What Exactly Happened with the Exim Vulnerability?

In September 2019, a vulnerability has been discovered in EXIM, an open-source mail transfer agent,
which is a program responsible for receiving, routing and delivering email messages.

In: #patching

Vicarius? What Do You Guys Even Disrupt?

TL;DR - The Next-Gen cyber-security revolution left one important field behind: Vulnerability Assessment. Vicarius is here to make things right

Leave a Reply

    Categories

    See all

    Strong Cyber Hygiene is only One Click Away

    Want to take TOPIA for a free ride? Schedule A Meeting with our 🐺team!

    Let us know what would like to see 😀