WebLogic Zero Day – Mr. Smith’s Hacker Insights
Hacker Insights is a series of blog posts meant to provide an understanding of the tools, mindset, methodologies, and history...
Call us today! 844-OCD-TECH
Hacker Insights is a series of blog posts meant to provide an understanding of the tools, mindset, methodologies, and history...
On May 14th, as part of Patch Tuesday, Microsoft announced a high-risk vulnerability (CVE-2019-0708) that exists in their Remote Desktop Protocol (RDP).
Critical Remote Desktop Flaw Identified in Microsoft Windows Operating Systems A newly discovered vulnerability in the Microsoft Remote Desktop Protocol...
A study by ZDNet reveals that 80% of organizations planned to increase their security spend in 2019 compared to their 2018 spend.
Have you been asked by one of your customers for your SOC 2 Report? If you are a Software as...
When a security researcher discovers a vulnerability, it becomes their responsibility to decide in which manner they will be disclosing the information.
One of the most accredited forms of validation for a citizen’s identity is a Social Security Number.
Many organizations are rapidly moving to the cloud for hosting everything from their products and services to their corporate infrastructure.
For the first time in over a decade, the current Wi-Fi security standard is receiving an upgrade.
As a board member, you are tasked with significant responsibilities. Beyond fiduciary responsibilities and setting the mission and vision of...
© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance