Colonial Pipeline Ransomware Attack

Briefing on the Colonial Pipeline Attack Below is background and known details of how the pipeline attack was executed, as well as some recommended mitigation tactics for organizations looking to cover their bases. Background The Colonial Pipeline attack, which shut...

SonicWall Email Security Products Target of Zero-Day Exploits

  SonicWall Email Security Products Target of Zero-Day Exploits Security researchers FireEye have identified three zero-day vulnerabilities in SonicWall Email Security (ES) products. These vulnerabilities can be chained together to gain administrative access to...

Vulnerability in WebKit Exposes Apple Users To Hackers

WebKit RCE in Apple macOS and iOS A flaw in Webkit, the underlying engine of Apple’s Safari browser, is responsible for a vulnerability that could allow an attacker to remotely execute arbitrary code in macOS Big Sur, iOS, iPadOS, and watchOS. Updating as soon...