CISA and NSA have released best practices documents on how to harden your virtual private network.
A great piece on what it will take to improve the safety of the connected world. Read it here.
Extended detection and response (XDR) captures threat data from previously isolated security tools throughout the organizations tech stack to enable...
Organizations are increasingly considering response capabilities within NDR solutions for dealing with threats detected through network traffic...
A new malware kit to compromise ISC (Industrial Control Systems) is detailed in this whitepaper by Dragos.
Towards the end of November, a researcher from Alibaba discovered a fault (CVE-2021-44228) in a well known open-source logging library called...
This is a developing story and the why is still a mystery. We starting to know the how.