Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 283–288 of 473 results
The Shortcomings of Traditional Penetration Tests
Companies tend to conduct pentests in flawed ways. Now a better, more automated, and faster approach to pentesting has arrived.
Read More IBM Finds Data Breach Costs Rise to $4.3M – And Firms Are Passing the Cost to Customers
Enterprise Security Tech: 07/28/22 For at least the last decade, there have been warning signs left and right that data breaches are an imminent part of business. Read the entire article here
Read More Best Data-Driven SaaS Product
NodeZero Named Finalist for Best Data-Driven SaaS Product in SaaS Awards
Read More Sudden Increase In Attacks On Modern WPBakery Page Builder Addons Vulnerability – Expert Comments
Information Security Buzz: 07/18/22 Attacks like this target and prey on the laymen who aren’t keeping up with the latest security research, attack paths, and EOL products. Read the entire article here
Read More Log4j Flaw Is ‘Endemic,’ Says Cyber Safety Review Board
Bank Info Security: 07/15/22 Cybersecurity firm Horizon3.ai detected the exploitation of Log4j in close to a quarter of the environments it was run in. Known vulnerabilities in widely deployed applications such as virtual desktops or wireless access points are just the beginning. “There are probably thousands of Java applications impacted by Log4shell to varying degrees,” it says. Read the entire article here
Read More The Long Tail of Log4Shell Exploitation
It's been more than six months since the Log4Shell vulnerability (CVE-2021-44228) was disclosed, and a number of post-mortems have come out talking about lessons learned and ways to prevent the next Log4Shell-type event from happening.
Read More