Enterprise Linux Security Episode 84 - Security Debt

Security Debt, or When Bugs Go Bad

Occasionally, the IT world is gripped by a resurgence of concern – sometimes a fleeting trend, other times a significant issue. Lately, the term “Security Debt” has been making the rounds across ...

Locking Up Lockbit: The Fall of a Ransomware Cartel

As of the time I’m writing this, earlier this week a cybersecurity bombshell story just broke that, for once, is actually a positive turn of events. I’m talking about Operation Cronos, an ...

WinRAR Flaw: LONEPAGE Malware Strikes Ukrainian Firms

In the realm of cybersecurity, vigilance is paramount, and recent developments reveal a persistent threat facing Ukrainian entities. In mid-2023, the Ukrainian CERT issued advisory #6710, unmasking a threat actor identified as ...
8 Essential Steps to Recover a Hacked Website

8 Essential Steps to Recover a Hacked Website

When you find out your website is hacked, it’s understandable that you’d begin to panic. But it’s much better to plan and take action immediately to get back to your website as ...

UEFI Failing: What to Know About LogoFAIL Attacks

Multiple UEFI vulnerabilities can lead to Linux, Windows, and Mac exploits LogoFAIL persists across operating system reinstallations It also extends the supply chain risks to the hardware itself   Security researchers, known ...

Beyond the Hyperbole: A Realistic Look at the Financial Payout of Ransomware

Discussions about cybersecurity often unfold amidst grandiose and alarming narratives: ‘high impact,’ ‘critical,’ ‘most dangerous vulnerability‘ – phrases designed to catch headlines. The conversation floats at a lofty level, warning organizations of ...
The Transition to CVSS v4.0 – What You Need to Know

The Transition to CVSS v4.0 – What You Need to Know

The Forum of Incident Response and Security Teams (FIRST) has officially released version 4.0 of the Common Vulnerability Scoring System (CVSS). This new version comes four years after the release of CVSS ...
What Is Web Security: Why Boosting Your Web Security Is the #1 Priority for Small Businesses

What Is Web Security: Why Boosting Your Web Security Is the #1 Priority for Small Businesses

You’re probably familiar with web security risks. If you’re running a small business, whether online, bricks and mortar or both, you hopefully have some kind of security for your online presence.    ...

From Heartbleed to Now: Evolving Threats in OpenSSL and How to Guard Against Them

In 2014, the cybersecurity community witnessed a critical OpenSSL vulnerability, “Heartbleed,” which changed how the world perceived digital security. It is considered to be among the most serious flaws in internet history ...
Navigating Open-Source Supply Chain Threats: Protecting Your Software Ecosystem

Navigating Open-Source Supply Chain Threats: Protecting Your Software Ecosystem

In today’s business world, companies are determined to create software faster than ever before. Developers are under immense pressure to deliver products to customers quickly. To accelerate this process, developers often rely ...