Search Results for: wordpress vulnerability

FIN7, the Notorious Cybercrime Group, Seeks to Breach Corporate Networks with Microsoft Exchange

FIN7, the Notorious Cybercrime Group, Seeks to Breach Corporate Networks with Microsoft Exchange

A recent report from Prodaft has unveiled FIN7 as one of the deadliest cybercrime groups on the planet, with a particular emphasis on breaching corporate networks through auto-attack systems that exploit Microsoft Exchange vulnerabilities. Corporate targets are selected based on their financial size, total employees, vulnerability, and other criteria.

What Is the Network Layer and How Can You Protect It from Cyberattacks?

What Is the Network Layer and How Can You Protect It from Cyberattacks?

In this article, you’ll learn what the network layer is, also known as Layer 3, in the Open Systems Interconnection (OSI) model. Understanding this layer in context with the OSI model and the currently adopted Transmission Control Protocol/Internet Protocol (TCP/IP) model can help you better protect your network. This article will also go through the top 5 ways you can protect your business using the OSI model as a basis to understand how network security tools work.

Top 11 Must-Have VPN Features for SMBs

Top 11 Must-Have VPN Features for SMBs

SMBs can find the most value in a VPN if they look for certain key features. In this article, we’ll talk about the top 11 VPN features most suited for SMBs. We’ll cover features such as secure VPN protocols, DNS leak protection, static IP addresses, router support, and more.

How to Create a Patch Management Policy

How to Create a Patch Management Policy

Every company is bound to face vulnerabilities sooner or later. In these cases, it’s necessary to act fast and patch immediately if you don’t want to be a victim of cyberattacks. Patching enables you to add new software features and functionality, fix broken code, and remediate known exploits. Discover how to create your own patch management policy to protect your business in this article.

Google Releases Report on Software Supply Chain Security

Google Releases Report on Software Supply Chain Security

In response to a rising number of software supply chain attacks, Google has released a public report, Perspectives on Security. The report documents the latest security vulnerability trends and how best to address them. The report comes on the second anniversary of the SolarWinds attack, which cost nine federal agencies and over 100 private companies USD 100 billion to clear up.

Web Application Firewalls Found Susceptible to a Bypass Technique

Web Application Firewalls Found Susceptible to a Bypass Technique

While web application firewalls can defend against SQL infusions, the addition of JSON renders them blind to malicious code. The generic bypass technique was demonstrated to affect major web application firewalls, including those used in Palo Alto Networks, Amazon Web Services, Cloudflare, F5, and Imperva. Consequently, all SQL-based web databases could be susceptible.

Scroll to Top