How We Discovered a Vulnerability in MapPress Pro (CVE-2020-12675)
Alert Logic researchers recently discovered a new vulnerability (CVE-2020-12675) in the MapPress Pro plugin while investigating a previous patch.
What is Threat Intelligence?
Threat intelligence plays an important role in effective cybersecurity and in managed detection and response — helping to inform detection efforts and guide efficient response to threats.
Alert Logic Identifies New Vulnerability: CVE-2020-12675 in MapPress Plugin for WordPress
Alert Logic researchers discovered a vulnerability in the MapPress plugin for WordPress and worked with the vendor to address the underlying flaw for CVE-2020-12675.
There Will Always Be Successful Attacks Which Is Why There Must Be MDR
Alert Logic conducted a series of 7 webcasts focused on the essential tenets of managed detection and response (MDR). The first focuses on the need for MDR because no amount of investing in cybersecurity will ever prevent all attacks.
The Attacker Playbook Hasn’t Changed
Businesses still are challenged to address cybersecurity for remote workers, but for attackers, it’s just another day and business as usual.
IT and Security Teams Adjust to New Normal of COVID-19 Quarantine
The third in a series of posts looking at the impact of the COVID-19 quarantine on technology, productivity, cybersecurity, and the threat landscape, and how tips for coping with the new normal.
The Benefits of Giving Up a Little Control over Cybersecurity
The COVID-19 pandemic and shutdown of businesses has forced families to embrace new processes. There are lessons in the Coronavirus quarantine for businesses in terms of giving up control to achieve desired outcomes.
Attackers Prey on Chaos and Confusion of COVID-19
Attackers like to prey on chaos and confusion and use current events as a lure to catch victims. The COVID-19 pandemic is a prime opportunity for attackers to up their game.
Addressing COVID-19 Cybersecurity Challenges with Tips from NASA
We are all facing a challenging and unprecedented situation with the response to the COVID-19 pandemic. Here are some tips to help employees manage their productivity and cybersecurity as they work remotely from home.
3 Reasons Businesses Shouldn’t Be Slashing Security Budgets
Discover 3 compelling business reasons to prioritize your security budget when your business is looking to reduce costs. Learn why reducing security investments can expose your business to greater risks in today’s threat landscape.
Top Docker Security Vulnerabilities, Best Practices, & Insights
Docker is one the most popular container runtime engine in use. But being the most popular comes at a price. It also means Docker vulnerabilities are exploited more frequently, as attackers attempt to gain access to important information and/or resources.
Is your Docker security strategy up to par? Learn how you can keep your system protected against hackers.
Defining Required Capabilities for Managed Detection and Response
Managed detection and response (MDR) is gaining momentum, but there is confusion about what it actually is. The MDR Manifesto was created to provide a definition and foundation for the basic capabilities MDR should provide.