18 min read
Understanding the Risks Associated with NTLM Authentication
Despite the release of Kerberos more than 20 years ago, many enterprises today have not transitioned away from using NTLM authentication in their...
18 min read
Despite the release of Kerberos more than 20 years ago, many enterprises today have not transitioned away from using NTLM authentication in their...
Control Gap's Robert Spivak had a follow up session with David Goodale from www.merchant-accounts.ca to talk about some of the major impacts that PCI...
7 min read
This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...
28 min read
This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...
19 min read
Software solutions have had to evolve rapidly to keep pace with cybersecurity threats. Today, nearly every significant software solution is loaded...
3 min read
In the realm of cybersecurity, accurately assessing and quantifying the severity of vulnerabilities is crucial for organizations to effectively...
2 min read
On May 3rd Google introduced several new top-level domains (TLDs), including the .zip TLD which has generated warnings from the cybersecurity...
3 min read
This week saw the publication of 294 new CVE IDs. Of those, 99 have not yet been assigned official CVSS scores, however, of the ones that were,...
4 min read
This week saw the publication of 501 new CVE IDs. Of those, 430 have not yet been assigned official CVSS scores, however, of the ones that were,...