by Bhabesh Raj Rai, Security Research Even the most sophisticated and advanced state-sponsored...
by Bhabesh Raj Rai, Security Research Department On January 25, 2022, Qualys disclosed the details...
Recent Active Directory (AD) privilege escalation vulnerabilities allow standard domain users to...
The Log4Shell exploit is serious - it's difficult to detect, used in lots and lots of software and...
The Remote Access Trojan (RAT) can be considered a legacy tool for hackers. The RAT is a malware...
On November 22, 2021, Security researcher Abdelhamid Naceri dropped PoC for a privilege escalation...
Though syslog protocol is very common, some customers are experiencing challenges to set it up...
Netflow support is available in LogPoint, and requires the Netflow Application to be installed....
SOAR is becoming increasingly important in an evolving cybersecurity landscape. Find out how to...
SOAR—a Security Orchestration, Automation and Response system—may be what your cybersecurity...
Conti ransomware first observed in May 2020 is widely believed to be the successor to Wizard...
On September 7, 2021, Microsoft released an advisory on a zero-day (CVE-2021-40444) vulnerability...