IT and Business Insights for SMB Solution Providers

My Information Resource

Blog Entry
May 4th, 2022 | Jay Ferron
The National Cybersecurity Center of Excellence (NCCoE) announces the release of NIST Internal Report (NISTIR) 8320, Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. - read more
 
Blog Entry
April 27th, 2022 | Jay Ferron
 CISA, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK)  have released a joint Cybersecurity Advisory that provides details - read more
 
Blog Entry
April 27th, 2022 | Jay Ferron
 Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could allow an attacker to elevate privileges to root on many Linux desktop endpoints. The vulnerabilities can be chained together to gain root privileges on Linux systems, allowing attackers to deploy payloads, like a root backdoor, and perform other malicious actions via arbitrary root code execution. - read more
 
Blog Entry
April 26th, 2022 | Jay Ferron
 The National Cybersecurity Center of Excellence (NCCoE) has released a new preliminary draft publication, Special Publication (SP) 1800-33 Volume B, - read more
 
Blog Entry
April 22nd, 2022 | Jay Ferron
 The National Initiative for Cybersecurity Education (NICE) is continuing to refine and clarify the Workforce Framework for Cybersecurity (NICE Framework) as a fundamental reference resource that is agile, flexible, modular, and interoperable. - read more
 
Blog Entry
April 21st, 2022 | Jay Ferron
 This FLASH is part of a series of FBI reports to disseminate known indicators of compromise (IOCs) and tactics, techniques and procedures (TTPs) associated with ransomware variants identified through FBI investigations. - read more
 
Blog Entry
April 21st, 2022 | Jay Ferron
ESET researchers have discovered and analyzed three vulnerabilities affecting various Lenovo consumer laptop models. - read more
 
Blog Entry
April 21st, 2022 | Jay Ferron
Highlights: ·        Check Point Research discovered vulnerabilities in the ALAC format that could have led an attacker to remotely get access to its media and audio conversations - read more
 

Pages

Subscribe to My Information Resource