Deep Dive on Jenkins Pipeline Plugin Remote Code Execution
Alert Logic Threat Intelligence researchers share details of a new threat exploiting flaws in Jenkins plugins for remote code execution attacks.
Alert Logic Expands Protection to Reduce Your Attack Surface
Alert Logic is introducing a number of new features and capabilities that expand our protection for customers and help them reduce their attack surface.
Emerging Threat: Drupal REST API Remote Code Execution
Alert Logic security researchers share details of critical emerging threat affecting Drupal REST APIs, which could allow remote code execution by attackers.
Defending Against Magecart Supply-Chain Attacks
Alert Logic researchers drill down to learn more about Magecart–attackers using a family of malicious supply-chain attacks against ecommerce sites.
5 Cybersecurity Statistics Every Small Business Should Know in 2018
A look at five important cybersecurity statistics small and medium businesses should be aware of to be better prepared to defend against malware attacks and exploits.
Emerging Threat: Jenkins Plugins Remote Code Execution
On the 20th February, 2019, Alert Logic research teams began tracking vulnerabilities affecting users of Jenkins which could allow an attacker to run malicious software remotely.
10 Must-Know 2018 Cybersecurity Statistics
See how the latest surprising cybersecurity statistics and trends are shaping plans, spending, and priorities for 2018. Get the details.
The Meltdown and Spectre CPU Bugs, Explained
The security world is spinning over the disclosure of two critical CPU vulnerabilities called Meltdown and Spectre. Here’s what you need to know.
RSA 2019 Sessions You Should Have on Your Calendar
A look at some of the cybersecurity sessions you should attend while you’re at the 2019 RSA Conference to get the most out of the event.
Simplifying Cybersecurity Deployments with Automation
A look at passive versus active scanning, host-based security, and how Alert Logic SIEMless Threat Management can automate and simplify deployment of effective cybersecurity.
Why You Don’t Need (or Want) a SIEM Tool
SIEM has been positioned and sold as some sort of cybersecurity “magic bullet” but companies have found out the hard way that implementing and managing a SIEM properly is not easy.
Understanding and Maintaining PCI Compliance
What is PCI compliance? This article looks at what PCI-DSS is and the challenges organizations face trying to achieve and maintain PCI compliance.