Author: admin
Oh Snap! More Lemmings: Local Privilege Escalation Vulnerability Discovered in snap-confine (CVE-2021-44731)
The Qualys Research Team has discovered multiple vulnerabilities in the snap-confine function on Linux operating systems, the most important of which can be exploited to escalate privilege to gain root […]McAfee Enterprise SSE: Named a Leader In 2022 Gartner Magic Quadrant for SSE
Recognizing the significant role SSE is filling in cybersecurity, Gartner® has published its first ever Magic Quadrant report for SSE. We are honored to announce that the McAfee Enterprise SSE […]Combat Advanced Threats with a Multi-disciplinary Threat Intelligence Program
Combat Advanced Threats with a Multi-disciplinary Threat Intelligence Program ALISON ADKINS Ransomware attacks on Colonial Pipeline, JBS Foods and Kronos are just a few recent examples in the rise of […]Forcepoint (Bitglass) recognized by Gartner® as a Visionary in first-ever Magic Quadrant™ for Security Service Edge (SSE)
Our SSE solution brings together the cloud-native platform developed by Bitglass (which joined the Forcepoint family in October 2021) with our latest advanced threat protection and data security technologies (which […]Key Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest Risk to Your Organization
Home » Titus Blog » Key Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest Risk to Your Organization HelpSystems Webmaster · Tuesday, February 15th, 2022 Enza Iannopollo, principal […]An Analysis of Software Supply Chain Attacks
Intentional Software Flaws?Security has always been about making sure what shouldn’t happen doesn’t happen. It means proving that something bad can never happen, even if things aren’t used properly. With […]KuppingerCole Review of Cloud Privilege Broker – A CIEM Solution
Recently, analyst research firm KuppingerCole released their Executive Review: Cloud Privilege Broker report, exploring BeyondTrust’s debut into the Cloud Infrastructure Entitlement Management (CIEM) space. In the report, KuppingerCole says:Microsoft & Adobe Patch Tuesday (February 2022) – Microsoft 70 Vulnerabilities with 0 Critical; Adobe 17 Vulnerabilities with 5 Critical
Microsoft Patch Tuesday – February 2022 Microsoft addresses 70 vulnerabilities in their February 2022 Patch Tuesday release. While none of the vulnerabilities in this month’s Microsoft release cycle have been […]Chris Jacob, ThreatQuotient: organizations must automate their security systems to mitigate escalating cyber threats
Even though protecting against malicious threat actors is equally important for both regular users and businesses, corporations are even more vulnerable to attacks – cybercriminals are more actively choosing high-profit […]The DOJ Recovers Bitcoin Worth $3.6 Billion, SIM Swap Attacks Rise, Antlion Attacks Taiwanese Businesses, Backdoor Trojan Attacks macOS Vulnerability
Earlier this week, the Justice Department seized more than $3.6 billion in bitcoin that was believed to be stolen as part of the 2016 hack of the cryptocurrency exchange Bitfinex. […]Load More