Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Tuesday, 03 December 2019
Enterprise Vulnerabilities From DHS/US-CERT’s National Vulnerability Database CVE-2019-19318PUBLISHED: 2019-11-28 In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer, CVE-2019-19319PUBLISHED: 2019-11-27 In the Linux kernel 5.0.21, a setxattr operation, after a mount of a crafted ext4 image, can
- Published in Threats, Threats Analysis
1 Comment
Cyber Security Digital Summit: A 101 Guide to Security Automation
Monday, 25 November 2019
The technology landscape for cyber security is very complicated with many vendors addressing different aspects of the enterprise security program. The need for organizations to overcome this complexity was discussed at the Cyber Security Digital Summit by Firemon VP of Technology Alliances Tim Woods. An example of complexity is witnessed in hybrid cloud security, which
- Published in Strategies
The Ransomware Survival Guide | Cyber Security Hub
Monday, 28 October 2019
What Every Organisation Needs To Know Before, During And After An Attack Sponsored By: Download Your Copy We respect your privacy, by submitting this form you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest. For further information on how we process
- Published in Attacks
5 Step Guide To Building Your Email Security Strategy
Monday, 30 September 2019
Addressing The Entire Email Attack Chain Sponsored By: Download Your Copy We respect your privacy, by submitting this form you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest. For further information on how we process and monitor your personal data click
- Published in Threat Defense, Threats
Cybercriminal’s Black Market Pricing Guide
Wednesday, 18 September 2019
Enterprise Vulnerabilities From DHS/US-CERT’s National Vulnerability Database CVE-2019-11559PUBLISHED: 2019-09-17 A reflected Cross-site scripting (XSS) vulnerability in HRworks V 1.16.1 allows remote attackers to inject arbitrary web script or HTML via the URL parameter to the Login component. CVE-2019-15729PUBLISHED: 2019-09-17 An issue was discovered in GitLab Community and Enterprise Edition 8.18 through 12.2.1. An internal endpoint
- Published in Threats, Threats Analysis
A Definitive Guide to Crowdsourced Vulnerability …
Friday, 13 September 2019
Knowing about a bug and actually securing it are very different things. These six steps will get you from “oh, sh*t” to fixed. There is no shortage of vulnerabilities to find. According to a new report from Bugcrowd, the total number of vulnerabilities reported over the past year has nearly doubled. (Disclaimer: I am the
- Published in Attacks
A Lawyer’s Guide to Cyber Insurance: 4 Basic Tips
Saturday, 13 July 2019
The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.
These days, it seems that everyone has heard a cyber insurance horror story: a catastrophic cyber event followed by a swift denial of cyber insurance coverage. At a time when all companies are beginning
- Published in Attacks
A Guide To Protecting The End User
Tuesday, 30 April 2019
A people-centric approach to managing cyber security vulnerability, attacks and privilege Download Your Copy We respect your privacy, by submitting this form you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest. For further information on how we process and monitor your
- Published in Strategies
GoT Guide to Cybersecurity: Preparing for Battle …
Thursday, 18 April 2019
Faced with an overwhelming adversary, Game of Thrones heroes Daenerys Targaryen and Jon Snow have a lot in common with today’s beleaguered CISOs. Strong similarities exist between the precarious plight of Daenerys Targaryen and that of modern security leaders. First off, both are outnumbered by their rivals — on paper, at least. North of the
- Published in Attacks