Our Blog
Home / Blog
Common spear-phishing tricks
Common spear-phishing tricks . To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails. Roman DedenokDecember 24, 2021 Virtually every employee of a large company comes across the occasional...
Enhanced and Additional SNMP Discovery Support and Resolved Issues in Remote Collector v17.08.03
Enhanced and Additional SNMP Discovery Support and Resolved Issues in Remote Collector v17.08.03 . Release Overview The Remote Collector v17.08.03 release includes enhanced SNMP autodiscovery support and several bug fixes. The most recent Main Appliance (MA) version...
Apache Log4j 2, Flexera and you
Apache Log4j 2, Flexera and you . By now, you’ve probably learned of Apache Log4j 2. As reported across the web, there is the recently disclosed CVE-2021-44228 vulnerability in Apache Log4j 2 (widely referred to as Log4Shell) affecting organizations far and wide. This...
Looking back at 2021 in cybersecurity with Netsparker
Looking back at 2021 in cybersecurity with Netsparker . As 2021 draws to a close, it is time for our customary round-up of the year’s most popular and relevant posts on the Netsparker blog, with a sprinkling of last-minute news and predictions for the coming year. A...
Improving SaaS Visibility: 3 Ways to Provide Guardrails Not Gates
By Jennifer Kuvlesky | December 22, 2021SaaS Management Improving SaaS Visibility: 3 Ways to Provide Guardrails Not Gates . New hybrid work models are continuing to cause significant shifts both in where employees work and in how organizations procure technology. With...