Emerging Threat: Active Exploit of Oracle WebLogic JSP File Upload Vulnerability
Alert Logic security researchers have discovered an active exploit in the wild for CVE-2018-2894, an Oracle WebLogic JSP File Upload Vulnerability. Here is what we know and what you should do.
Worried About Container Security? Network Intrusion Detection Can Help
Learn how Alert Logic’s network intrusion detection for containers addresses the security challenges faced by IT organizations. As businesses adopt containerization, security teams struggle to monitor network traffic, leaving them vulnerable to attacks. Our solution ensures robust protection, making it easier to detect threats targeting your containers and hosts.
Use These Frameworks to Establish GDPR Security Controls
As with just about any new technology, the benefits of containers come with a number of unique security concerns.
GDPR Q&A with a Cybersecurity, Compliance and Privacy Expert
Alert Logic’s Audian Paxson conducts a Q&A on GDPR with cybersecurity, compliance and privacy expert Tom Cornelius.
What You Need to Know about GDPR Article 32
This post focuses on Article 32 of the GDPR and breaks it down to try and understand exactly what the rule prescribes when it comes to IT security and data protection.
What GDPR Compliance means to the IT Security Professional
Read this blog to unpack why 7 percent of companies surveyed in our new 2018 GDPR Compliance Report said they were on track to be compliant when the GDPR came into force on May 25, 2018.
5 Keys for Effective Threat Detection
There is no perfect security solution, but effective threat detection can help you avoid most attacks and quickly identify and remediate the ones that get through your defenses to minimize the impact.
SSH Worming CryptoMiner Targets Vulnerable WebLogic Instances
Attackers have combined known POCs for WebLogic CVE-2017-10271 with a clever script that attempts to worm across the victims network by abusing recent SSH connections and stored SSH private keys.
PHP Vulnerabilities Old and New — Part 2
Joe Hitchcock continues his examination of PHP vulnerabilities–diving deep into the world of SQL injection.
The Benefits and Challenges of Threat Hunting
A new report–sponsored by Alert Logic–examines the growing trend of threat hunting, and the unique benefits and challenges of taking a more proactive approach to security.
Full Stack Security: Protecting Your Development Platform
Learn how Alert Logic full stack security helps defend against common vulnerabilities and exploits in popular development platforms.
Why a SOC Is Crucial for Effective Cloud Security
A look at why a security operations center (SOC) plays such a crucial role in providing effective cloud security.