3 Components of a Proactive Security Strategy 

Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks.  Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited.  Proactive security measures help you stay ahead of attackers by: Proactive security also […]

Read More… from 3 Components of a Proactive Security Strategy 

Patch Tuesday Update – June 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.44.0 and FVM Agent 2.8 releases. CVE/Advisory Title Tag Microsoft Severity Rating Base Score Microsoft Impact Exploited Publicly Disclosed CVE-2024-30069 Windows Remote Access Connection Manager Information Disclosure Vulnerability Windows Remote Access Connection Manager Important 4.7 Information Disclosure No No CVE-2024-30070 DHCP Server Service […]

Read More… from Patch Tuesday Update – June 2024

How to Use Upskilling and Reskilling to Scale Your Cybersecurity Team

The cybersecurity skills shortage is not just an ongoing inconvenience—it is a serious vulnerability that can be exploited by attackers. But how can organizations go about patching this gap while the talent gap endures? The answer lies in leveraging the resources you already have on hand: your existing workforce.  How do you transform your personnel […]

Read More… from How to Use Upskilling and Reskilling to Scale Your Cybersecurity Team

Patch Tuesday Update – May 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.42.0 and FVM Agent 2.7 releases. CVE/Advisory Title Tag Microsoft Severity Rating Base Score Microsoft Impact Exploited Publicly Disclosed CVE-2024-32002 CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution Visual Studio Important 9 Remote Code Execution No […]

Read More… from Patch Tuesday Update – May 2024

The Challenge of Securing Bluetooth Low Energy (BLE) Technology in Healthcare 

It’s the age-old question: when does convenience undermine security? In the healthcare sector, the answer can literally spell the difference between life and death. As the Internet of Medical Things (IoMT) grows, wireless attacks abound. While not any harder to launch than against traditional IoT devices, these attacks are drastically more high-stakes and can use […]

Read More… from The Challenge of Securing Bluetooth Low Energy (BLE) Technology in Healthcare 

Patch Tuesday Update – April 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.40.0 and FVM Agent 2.6 releases. CVE/Advisory Title Tag Microsoft Severity Rating Base Score Microsoft Impact Exploited Publicly Disclosed CVE-2024-20669 Secure Boot Security Feature Bypass Vulnerability Windows Secure Boot Important 6.7 Security Feature Bypass No No CVE-2024-20688 Secure Boot Security Feature Bypass Vulnerability […]

Read More… from Patch Tuesday Update – April 2024

BeSTORM Version 13.2.0

BLE, CANBUS Enhancements, new protocols in beSTORM BeSTORM 13.2 launches a few highly requested enhancements along with several protocol additions.  These additions will help expand the implementation of black box fuzzing during application development.  International compliance regulations are beginning to require fuzz testing security certification within testing labs on telecommunication and wireless connectivity equipment, prior […]

Read More… from BeSTORM Version 13.2.0

Patch Tuesday Update – March 2024

Fortra VM will include the Microsoft Patch Tuesday checks in the NIRV 4.38.0 and FVM Agent 2.5 releases. CVE/Advisory Title Tag Microsoft Severity Rating Base Score Microsoft Impact Exploited Publicly Disclosed CVE-2024-20671 Microsoft Defender Security Feature Bypass Vulnerability Windows Defender Important 5.5 Security Feature Bypass No No CVE-2024-21392 .NET and Visual Studio Denial of Service […]

Read More… from Patch Tuesday Update – March 2024