Threats by State Actors in Private Sector IT Security
Hackers come in all shapes and sizes.
Call us today! 844-OCD-TECH
Hackers come in all shapes and sizes.
A critical remote command execution vulnerability was recently identified within Exim, the UNIX based mail transfer agent.
n this installment of Hacker Insights, we’ll take a deep dive into one of the mechanisms hackers….
Hacker Insights is a series of blog posts meant to provide an understanding of the tools, mindset, methodologies, and history...
On May 14th, as part of Patch Tuesday, Microsoft announced a high-risk vulnerability (CVE-2019-0708) that exists in their Remote Desktop Protocol (RDP).
Critical Remote Desktop Flaw Identified in Microsoft Windows Operating Systems A newly discovered vulnerability in the Microsoft Remote Desktop Protocol...
A study by ZDNet reveals that 80% of organizations planned to increase their security spend in 2019 compared to their 2018 spend.
Have you been asked by one of your customers for your SOC 2 Report? If you are a Software as...
When a security researcher discovers a vulnerability, it becomes their responsibility to decide in which manner they will be disclosing the information.
One of the most accredited forms of validation for a citizen’s identity is a Social Security Number.
© 2024 — OCD Tech: IT Audit - Cybersecurity - IT Assurance