Blogs

Local Privilege Escalation Vulnerability Discovered in VMware Fusion
Summary:
VMware Fusion contains a local privilege escalation vulnerability that allows an attacker to inject a malicious path into the system-wide PATH environment variable.
Versions Tested:
VMware Fusion Professional v15.5.5

The Democratization of Security
How Permissions Elevate both Transparency and Efficiency to Build Healthier Security Relationships

Electronic Voting: 3 Ways to Strengthen Election Security
It is no secret that wildly different political views aside, the threat of foreign and even domestic interference in the 2020 U.S. presidential elections is dominating our politics in advance of November.
At its core, the subject of election security comes down to one key question: How secure is your vote?

How to Develop a Cybersecurity Playbook in 5 Steps

Exploiting Enterprise Passwords
No matter how much you think you’ve done to safeguard your data and systems against brea

[2020 Updates] Gartner Endpoint Security Hype Cycle Insights
Gartner recently released their 2020 Hype Cycle for Endpoint Security, and the focus is crucial to the security defense, successful implementation, and daily operation of businesses everywhere, especially now.

SIEM & MDR: What You Need to Know
A defense-in-depth security strategy is built upon the premise that no one tool or process is enough to ensure the protection of an organization’s entire technology infrastructure.
But if there is one layer that should be considered foundational to any effective cybersecurity strategy, it is Security Incident and Event Management (SIEM).

Critical Vulnerabilities Discovered in MoFi Routers

Versions Tested:

Benefits of Security Orchestration, Automation, & Response (SOAR)
With threats to network security increasing in sophistication and expanding the roster of entry points to include the ever-growing list of cloud-based services and applications that they can use to launch an attack, security analysts need to constantly adapt through new tools to collect data and monitor events.
Literally thousands of alarms through different monitoring solutions might need to be manually monitored, and that’s simply too much for a team to manage.

A New MDR Managed SIEM Offering Powered by Devo

By Rob Davis, CEO of CRITICALSTART