Are Your Cybersecurity Investments In Tools and Services Paying Off?

Abricto Team

Finding, implementing, and supporting cybersecurity tools and services within an organization can be a daunting task for a company of any size. There is no shortage of cybersecurity tools and services available to address just about every area of cybersecurity risk. The tools or services a company leverages can vary widely from one company to Are Your Cybersecurity Investments In Tools and Services Paying Off?

Why Critical Vulnerabilities Like Log4Shell Will Continue to Surface

Log4Shell

What is Log4Shell? Log4Shell is a critical vulnerability that affects the Log4J Java logging library (versions 2.14.0 and earlier) bundled into the Apache logging services. The vulnerability allows remote code execution (RCE) by a malicious actor on any system that leverages the vulnerable library and permits outbound network access. How can I tell if my Why Critical Vulnerabilities Like Log4Shell Will Continue to Surface

User Enumeration in a Production Environment – Credential Stuffing 101

Ah yes, credential stuffing! Almost as common as thanksgiving stuffing, yet as distasteful as black Friday shopping. Credential stuffing is especially effective when it’s coupled with user enumeration. The likelihood of user enumeration attacks occurring on typical web applications is high, and the impact is often hard to define, making this a moderate risk severity User Enumeration in a Production Environment – Credential Stuffing 101