Stay up-to-date on the latest cyber threats
08/30/2023
By: T.J. Ramsey
When a threat actor performs a “Living Off the Land” (LOTL) attack, they use legitimate tools and processes within a ...
08/18/2023
By: Scott McIntosh
NIST, or the U.S. National Institute of Standards and Technology, is at the forefront of the evolving realm of cybersecurity. ...
08/07/2023
By: Fortified Health Security
In July, cybercriminals increasingly targeted Linux systems and exploited new zero-day vulnerabilities in Citrix solutions. While threat actors never cease ...
07/26/2023
By: Tamra Durfee
In television dramas and Hollywood movies, ransomware attacks are often made known by a flashy message that pops up on ...
07/13/2023
By: Fortified Health Security
During the summer months, threat actors often escalate their activities, taking advantage of staffing shortages among IT teams, and leaving ...
06/21/2023
By: T.J. Ramsey
What is attack surface management? Think of your attack surface as a fortress with multiple entry points. Each entry point ...
Resources
© Copyright 2024 Fortified Health Security, Inc. All rights reserved. Contact Us | Terms of Service | Privacy Policy | Cookie Policy