Loading

Blog

Threat Advisory: Unauthenticated Access via F5 BIG-IP (CVE-2022-1388) 

May 09, 2022
Threat  Unauthenticated access via F5 BIG-IP  Vulnerability  F5 Networks BIG-IP : BIG-IP iControl REST vulnerability (CVE-2022-1388)1  CVSS – 9.8 CRITICAL ...
Read More

What to Know About the Top 15 Exploited Vulnerabilities

May 03, 2022
A recent joint cybersecurity advisory from U.S and allied cybersecurity authorities identified the top exploited vulnerabilities and exposures (CVEs) of...
Read More

Threat Advisory: Remote Procedure Call Runtime Remote Code Execution Vulnerability (CVE-2022-26809)

April 14, 2022
Threat  Remote Code Execution through Microsoft RPC  Vulnerability  Remote Procedure Call Runtime Remote Code Execution Vulnerability (CVE-2022-26809)1  CVSS – 9.8...
Read More

Threat Advisory: Spring Framework Spring4Shell Vulnerability (CVE-2022-22965)

April 13, 2022
Threat  Remote Code Execution (RCE) in the Java Spring Framework  Vulnerability  Spring Framework Spring4Shell (CVE-2022-22965)1  CVSS – 9.8 CRITICAL  Vulnerability...
Read More

Cyber Advisory: Heightened Awareness Related to Russian Cyberattacks

March 15, 2022
As the Russian invasion of Ukraine progresses, having a heightened awareness for the potential cyber activities associated to the spillover...
Read More

Four Questions Your Board Will Ask You About Cyber Risk

March 15, 2022
Board members today are increasingly concerned with cybersecurity risks. Recent Gartner research found “Eighty-eight percent of Boards of Directors (BoDs)...
Read More

How Integrated Cyber Risk Management Helps Your Organization

March 10, 2022
In today’s world, organizations need to have accurate and complete visibility into their entire asset inventory, associated vulnerabilities, and threat...
Read More

Cyber Risk Scoring- The FortifyData Scoring Methodology

January 13, 2022
What is a cyber risk score? A cyber risk score is a benchmark score or rating of an organization’s level...
Read More