Blog

Providing Solutions

Protect data backups from malicious attacks and theft

Encryption, protected cloud servers vital to secure backups

Reconstructing PowerShell scripts from multiple Windows event logs

On the trail of malicious PowerShell artifacts too large to be contained in a single log? Help is on the way.

Horde of miner bots and backdoors leveraged Log4J to attack VMware Horizon servers

In the wake of December 2021 exposure of a remote code execution vulnerability (dubbed “Log4Shell”) in the ubiquitous Log4J Java logging library, we tracked widespread attempts to scan for and exploit the weakness—particularly among cryptocurrency mining bots. The vulnerability affected hundreds of software products, making it difficult for some organizations to assess their exposure. One…
Read more

Q&A with cyber insurance experts explaining coverages, claims and trends

Topics include protecting OT networks, myths about claims and how to pick the right amount of insurance