Managing NERC CIP Patching Process With Tripwire Enterprise and Tripwire State Analyzer

One of the hardest parts of managing an organization’s cybersecurity is patch management. Just as…

CIS Control 08: Audit Log Management

Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing…

BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products

BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and…

INTERPOL Pushes for "Romance Baiting" to Replace "Pig Butchering" in Scam Discourse

INTERPOL is calling for a linguistic shift that aims to put to an end to…

Effective Phishing Campaign Targeting European Companies and Organizations

A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder,…

[FortiWLM] Unauthenticated limited file read vulnerability

A relative path traversal [CWE-23] in FortiWLM may allow a remote unauthenticated attacker to read…

Credentials can be dumped from memory

A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClient Windows may permit a local…

OS command injection

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability…