Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer
One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as…
CIS Control 08: Audit Log Management
Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing…
BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products
BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and…
INTERPOL Pushes for "Romance Baiting" to Replace "Pig Butchering" in Scam Discourse
INTERPOL is calling for a linguistic shift that aims to put to an end to…
Effective Phishing Campaign Targeting European Companies and Organizations
A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder,…
[FortiWLM] Unauthenticated limited file read vulnerability
A relative path traversal [CWE-23] in FortiWLM may allow a remote unauthenticated attacker to read…
Credentials can be dumped from memory
A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClient Windows may permit a local…
OS command injection
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability…