Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
August 17, 2021 | Whitepapers
Are you ready to respond to Ransomware? If APT29 is targeting your sector, can you detect and disrupt their known…July 29, 2021 | Blogs
Being a #learnitall, Lesson 1: Be Open to Be Wow’d Most of the startup advice out there is pretty clear: get…March 30, 2021 | Webinar Replays
In the world of network security, compliance is the bare minimum. Compliance is locking your door, but what about your…March 8, 2021 | Disclosures
Zabbix is an enterprise IT network and application monitoring solution. In a routine review of its source code, we discovered…February 24, 2021 | Attack Blogs
Write the file supplied in the --file argument to the location specified in the --path argument. The file will be…February 23, 2021 | Blogs
I'm sharing this because I believe it is relevant to ongoing decisions in this community. I'm in a senior leader…February 23, 2021 | Blogs
Purple teaming is the result of collaboration, communication and sharing of information between a red team and a blue team…February 7, 2021 | Disclosures
LibreNMS is an open source solution for network monitoring based on PHP, MySQL and SNMP. While reviewing its source code,…January 24, 2021 | Disclosures
Mautic is widely used open source software for marketing automation. While researching the application and its source code on Github,…January 5, 2021 | Disclosures
OrangeHRM is software for Human Resource Management (HRM). In a routine audit of the open source version of OrangeHRM, we…