BLOG

Watch Now: Hackers Exploit Low/Med. CVSS Vulnerabilities

 

Today, we look at risks endured due to an over-reliance on the NIST CVSS ranking system. ...

Vulnerability Management in the Work from Home Era

 

Guest post from Jaquar Harris, Director of Intelligence Services at Global Resilience...

Avoiding Ransomware: Case Study on University of Utah's $457,000 Payment to Malicious Hackers

 

At the end of last week, ZD Net reported that the University of Utah paid $457,000 to...

Whence CyRating

 

 

CyRating® is a risk measurement representing the current real-world threat to a...

Partnership Brings Predictive Threat Intelligence to GRF Members

Patch What Matters: Strategic Partnership Brings Predictive Threat Intelligence to GRF Member...

LibreHealth Open Source Software Flaws

Last week, on July 14, 2020, security researchers at BishopFox Labs (BFL) disclosed new...

Cozy Bear Conducting COVID-19 “Research”

 

 

The Russian hacker group Cozy Bear or APT29 (aka the Dukes, Office Monkeys, CozyCar) is...

WAFs and Ignored Threats

 

There is growing, general dissatisfaction with Web Application Firewalls (WAFs) as highlighted...

Identify and Mitigate Systemic Cyber Threat

 

For CISO’s responsible for a portfolio of companies – whether at a private equity firm,...