Security Cloud Courses About

Tagged With 'Vulnerabilities'

<< More tags

imgs/thumbnail.webp
Pegasus Spyware Runs Roughshod over Human Rights

The Pegasus Project is a collaborative effort by a number of media and advocacy organizations around to the world. With their work, they are shining a …

imgs/thumbnail.webp
Microsoft Windows PrinterNightmare Patch Highlight “Unperfect” Security Decisions

The out-of-band patch for PrinterNightmare on Microsoft Windows doesn’t completely fix the issue. What are IT and security teams to do?

imgs/thumbnail.webp
Windows Is Having a PrinterNightmare and Can’t Wake Up

PrinterNightmare is a high severity vulnerability that affects all versions of Windows and is being actively exploited…on a long weekend 😬

imgs/thumbnail.webp
Cybersecurity Patching in Context

Letting customers know about a security vulnerability is never an easy thing. From the logistics of it to the reputation management issues. But this …

imgs/thumbnail.webp
Zoom.us & The Real Cybersecurity Problem

Zoom.us had a pretty egregious security issue this week. Their response was poor despite the best efforts for responsible disclosure by the security …

imgs/thumbnail.webp
Cybersecurity Basics #2 - Vulnerabilities, Exploits, and Threats

Continuing the “basics” series, here’s an easy way to understand the terms: vulnerability, exploit, threat, and risk

imgs/thumbnail.webp
Blocking IP Addresses

Is IP blocking still effective? Is it a sledge hammer when you really need a scalpel?

imgs/thumbnail.webp
Rizenfall And Needless Hype

CPU Vulnerabilities Seem Like A Massive Problem. Are they deserving of the hype?

imgs/thumbnail.webp
Apple Unicode Bug

One character can crash your iPhone. It’s a bit of problem.