by bct2mastertemp | Sep 29, 2022 | Blog
Based on a recent survey conducted by the folks at Titaniam, a solid majority of organizations have robust security tools in place. Yet nearly 40 percent of them have fallen victim to a ransomware attack in the past year. How can this be? With conventional tools in...
by bct2mastertemp | Sep 28, 2022 | Blog
In June, Wiz engineers discovered and reported #AttachMe, a critical cloud isolation flaw in Oracle Cloud Infrastructure (OCI). Due to its potential to affect all OCI customers, the #AttachMe cloud vulnerability is one of the most severe vulnerabilities discovered to...
by bct2mastertemp | Sep 27, 2022 | Blog
Recently, Google’s engineers introduced a small but important feature to their Calendar app. If you haven’t used the “known senders” option, you owe it to yourself to check it out. It allows you to toggle a setting that will filter out invites...
by bct2mastertemp | Sep 26, 2022 | Blog
DuckDuckGo has a reputation for protecting the privacy of its users far more than most other companies. Last year, the tiny search engine announced that they were experimenting with a free service designed to dodge email trackers as a means of further protecting the...
by bct2mastertemp | Sep 24, 2022 | Blog
On September 7, 2022, Apple hosted its annual product release event at one pm Eastern Time (ET). Tim Cook, Apple’s CEO, took the stage at the Far Out event held at the company’s headquarters in Cupertino, California, to unveil a slew of brand-new and...
by bct2mastertemp | Sep 23, 2022 | Blog
Microsoft Teams is a part of the 365 product family and is used by more than 270 million people for exchanging text messages, videoconferencing, and file storage. In August of 2022, the team at Vectra Protect discovered a post-exploitation vulnerability in the...