Blog

Stay up-to-date on the latest cyber threats

By Category
By Date

08/30/2023

By: T.J. Ramsey

When a threat actor performs a “Living Off the Land” (LOTL) attack, they use legitimate tools and processes within a ...

08/18/2023

By: Scott McIntosh

NIST, or the U.S. National Institute of Standards and Technology, is at the forefront of the evolving realm of cybersecurity. ...

08/07/2023

By: Fortified Health Security

In July, cybercriminals increasingly targeted Linux systems and exploited new zero-day vulnerabilities in Citrix solutions. While threat actors never cease ...

07/26/2023

By: Tamra Durfee

In television dramas and Hollywood movies, ransomware attacks are often made known by a flashy message that pops up on ...

07/13/2023

By: Fortified Health Security

During the summer months, threat actors often escalate their activities, taking advantage of staffing shortages among IT teams, and leaving ...

06/21/2023

By: T.J. Ramsey

What is attack surface management? Think of your attack surface as a fortress with multiple entry points. Each entry point ...