How We Discovered a Vulnerability in MapPress Pro (CVE-2020-12675)
Alert Logic researchers recently discovered a new vulnerability (CVE-2020-12675) in the MapPress Pro plugin while investigating a previous patch.
What is ‘Threat Intelligence’?
Threat intelligence plays an important role in effective cybersecurity and in managed detection and response–helping to inform detection efforts and guide efficient response to threats.
Alert Logic Threat Research Team Identifies New Vulnerability: CVE-2020-12675 in MapPress Plugin for WordPress
Alert Logic researchers discovered a vulnerability in the MapPress plugin for WordPress and worked with the vendor to address the underlying flaw for CVE-2020-12675.
There Will Always Be Successful Attacks Which Is Why There Must Be MDR
Alert Logic conducted a series of 7 webcasts focused on the essential tenets of managed detection and response (MDR). The first focuses on the need for MDR because no amount of investing in cybersecurity will ever prevent all attacks.
The Attacker Playbook Hasn’t Changed
Businesses are scrambling to address cybersecurity from the perspective of the “new normal” of a remote work-from-home workforce, but for attackers this is just another day and business as usual.
IT and Security Teams Adjust to New Normal of COVID-19 Quarantine
The third in a series of posts looking at the impact of the COVID-19 quarantine on technology, productivity, cybersecurity, and the threat landscape, and how tips for coping with the new normal.
The Benefits of Giving Up a Little Control over Cybersecurity
The COVID-19 pandemic and shutdown of businesses has forced families to embrace new processes. There are lessons in the Coronavirus quarantine for businesses in terms of giving up control to achieve desired outcomes.
Attackers Prey on Chaos and Confusion of COVID-19
Attackers like to prey on chaos and confusion and use current events as a lure to catch victims. The COVID-19 pandemic is a prime opportunity for attackers to up their game.
Addressing COVID-19 Cybersecurity Challenges with Tips from NASA
We are all facing a challenging and unprecedented situation with the response to the COVID-19 pandemic. Here are some tips to help employees manage their productivity and cybersecurity as they work remotely from home.
3 Business Reasons Why You Shouldn’t Be Slashing Security Right Now
Some companies are cutting back on security in response to the COVID-19 pandemic and its affect on the economy, but there are sound business reasons why security should not be the first thing to be reduced.
Top Docker Security Vulnerabilities, Best Practices, & Insights
According to the 2019 State of the Container and Kubernetes Security Report Containerization, Docker is the most popular container runtime engine in use. But being the most popular comes at a price. It also means Docker vulnerabilities are exploited more frequently, as attackers attempt to gain access to important information and/or resources.
In this post, we’re going to talk about Docker container security and how you can keep your system protected against hackers.
Defining Required Capabilities for Managed Detection and Response
Managed detection and response (MDR) is gaining momentum, but there is confusion about what it actually is. The MDR Manifesto was created to provide a definition and foundation for the basic capabilities MDR should provide.