It used to be the case that perimeter security solutions were enough to keep the good guys in and the bad guys out of the enterprise network. The tools worked by identifying and blocking malicious code and bad actors from infiltrating corporate networks, servers, workstations, applications, logins, and databases. Perimeter security tools like firewalls, Virtual Private Networks (VPNs), antivirus, and intrusion prevention systems served as a brick wall protecting the corporate network. While the......
A Threat Intelligence Analyst on Vertek’s Cybersecurity team recently discovered a massive spam recipient list from a bad threat...Read More
Threat Summary On May 8th 2018 , Microsoft released critical security updates to patch a Remote Code Execution (RCE)...Read More
Threat Summary This blog is regarding a memory corruption vulnerability in the equation editor of Microsoft Office that affects...Read More