Resources

News

Let’s Celebrate World Backup Day 2024 – Hear From Industry Experts – VMBlog

April 1, 2024 | As World Backup Day 2024 approaches, industry experts share insights on the importance of ro

News

Hotel Check-in Kiosks Expose Guest Data, Room Keys - Dark Reading

June 7, 2024 | A vulnerability in Ariane Systems' kiosk platform (CVE-2024-37364) allows attackers to access guest data and c

News

Popular WordPress Plugins Leave Millions Open to Backdoor Attacks - Hack Read

June 3, 2024 | Fastly researchers discovered vulnerabilities in popular WordPress plugins, including WP Meta SEO, WP Statisti

News

The Gately Report: SolarWinds Says Generative AI Not a 'Scary Monster' - Channel Futures

June 3, 2024 | SolarWinds' SVP Krishna Sai emphasizes that generative AI is beneficial, not intimidating, helping organizatio

News

2 D-Link Router Bugs Added to CISA’s Exploited Vulnerabilities Catalog - SC Magazine

May 18, 2024 | CISA has added two end-of-life D-Link routers to its Known Exploited Vulnerabilities catalog, urging immediate

News

Dangerous Google Chrome Zero-Day Allows Sandbox Escape – Dark Reading

May 14, 2024 | Google released an emergency update for Chrome, addressing a zero-day vulnerability (CVE-2024

News

A Comprehensive Roundup for Internet Safety Month – Hear from Industry Experts – VM Blog

June 18, 2024 | In honor of Internet Safety Month, VM Blog gathers insights from top industry experts to help you stay safe o

News

Why Teams Need a Strategy for Responding to AI-Driven Threats – SC Magazine

June 18, 2024 | As AI-driven cyber threats evolve, security teams must adopt advanced strategies to counteract them.

News

Black Basta Ransomware Suspected of Exploiting Windows Zero-Day Flaw – Secure World Magazine

June 12, 2024 | Black Basta ransomware is believed to have exploited a Windows zero-day vulnerability (CVE-2024-26169) before

News

Getting Your Cybersecurity Career Started: Advice for Recent Tech Grads – DICE Insights

June 21, 2024 | Recent tech graduates face unique challenges and opportunities as they enter the cybersecurity workforce.