On December 10, 2021, Apache published details of the CVE-2021-44228 vulnerability in the Log4j utility. Here's what we know so far, and our suggestions.
After a breach, tech companies face potential legal action from customers. How do we determine the risk factors for litigation, and what are our findings?
HTTP Security Headers establish rules for browsers connecting to a web page. Learn about best practices for more secure browsing in this short cyber blog.
A faulty configuration change impacted 3.5 billion people. What can we learn about the systemic risks that occur due to reliance on third party providers?
We know ransomware is a major concern, and threat actors target backups to encrypt or delete them. Now what is a 3-2-1 backup plan, and how does it help?
The threat of ransomware is persisting, and tech companies have unique risks. Here are five high-impact security practices to protect your organization.
After a particularly busy week in the world of threat response, Corvus continues to monitor the Kaseya VSA situation and the PrintNightmare vulnerability.