Blog

Stay up-to-date on the latest cyber threats

By Category
By Date

08/07/2023

By: Fortified Health Security

In July, cybercriminals increasingly targeted Linux systems and exploited new zero-day vulnerabilities in Citrix solutions. While threat actors never cease ...

07/26/2023

By: Tamra Durfee

In television dramas and Hollywood movies, ransomware attacks are often made known by a flashy message that pops up on ...

07/13/2023

By: Fortified Health Security

During the summer months, threat actors often escalate their activities, taking advantage of staffing shortages among IT teams, and leaving ...

06/21/2023

By: T.J. Ramsey

What is attack surface management? Think of your attack surface as a fortress with multiple entry points. Each entry point ...

05/17/2023

By: Aaron Price

A disheartening reality is that cyberattacks targeting healthcare and other critical industries are on the rise, making it more important ...

04/26/2023

By: Jake Bice

What is threat hunting? Similar to how early detection and prevention are crucial to maintaining patient health, threat hunting plays ...