Our Blog
Home / Blog

On the front lines against malware with ESET researcher Zuzana Hromcová
What is it like to be in the trenches fighting malware? On the occasion of International Women’s Day 2021, we sit down with ESET researcher Zuzana Hromcová who shares the inspiration behind her work. Malware strikes every day, often indiscriminately targeting users...

Massively exploited vulnerabilities in MS Exchange Server
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network. Microsoft has issued out-of-band patches for several Exchange Server vulnerabilities. Four of these vulnerabilities, according to the company, are...

Business applications enhancements, CRE improvements, and more in V16.23.00
Update Overview As part of Device42’s ongoing enhancement of its application dependency mapping functionality, v16.23.00 now includes the ability to create Business Applications directly from multiple devices, view application components that are associated with...

You can’t manage tomorrow’s IT ecosystem with yesterday’s tools
We all know that CIOs and the IT executives who work for them are accustomed to making the impossible happen. But the current trends in IT spend and usage are requiring these leaders to work mathematical miracles that redefine...

Understanding Cookie Poisoning Attacks
Cookie poisoning is a general term for various attacks that aim to manipulate or forge HTTP cookies. Depending on the attack, cookie poisoning might lead to session hijacking, exposure of sensitive information, or taking over a victim’s account. Let’s see what attacks...