Today Fortinet announced a critical authentication bypass in its FortiGate products that could lead to administrator access. This vulnerability, CVE-2022-40684, has been patched and admins are advised to upgrade or implement workaround safeguards immediately. The...
For as long as we can remember, having antivirus (AV) software installed and updated was an important aspect of a healthy cyber security posture. However as threats have evolved, the tools that thwart attacks must evolve, and this includes antivirus. Threats are no...
91% of cyber attacks begin with a phishing email. Phishing remains the most common and successful way for hackers to get their foot in the door before infecting an organization with malware. Often, those phishing emails contain counterfeit links that will lead a...
Phishing is a cybersecurity attack where the perpetrator pretends to be a trusted source through an email. The thief may masquerade as your bank or your favorite place to shop and try to trick you into entering your username and password into their fake sites. ...
On Friday, a vulnerability called “Log4j” that effects a large variety of consumer and business applications was revealed. This threat effects a tool that many closed and open-source applications use for logging purposes. This vulnerability is rated at...
Changing Landscape of Cyber Security Cyber Security has always been a moving target. In the past, bad actors would hunt and search for their targets. Due to the time it took to research, plan, and execute attacks, larger businesses were chosen to maximize the reward...