
Threat Advisory: Apple Zero-Day Vulnerabilities
(CVE-2022-32894 and CVE-2022-32893) Event Summary Apple is urging macOS, iPhone and iPad users to install the released update as soon as possible. The update includes
New Cyber Defense Brand DeepSeas to Unite Newly Acquired Commercial Managed Threat Services Business from Booz Allen Hamilton with Security On-Demand. Learn More
Booz Allen's Managed Threat Services business and DeepSeas cyber security was described to me during a recent chat with Wade Alt, the new Chief Operating Officer of DeepSeas. I learned his perspective on the launch
By Chris Esemplare, CEO at DeepSeas In the cyber security market, DeepSeas is a new name, but it’s not a startup. Rather, it’s the unification of two mighty forces in cyber defense: Booz Allen Hamilton’s
(CVE-2022-22241, CVE-2022-22242, CVE-2022-22243, CVE-2022-22244, CVE-2022-22245, CVE-2022-22246) Event Summary Multiple high-severity security flaws have been disclosed as affecting Juniper Networks devices (J-Web component of Juniper Networks Junos OS), some of which could be exploited to achieve
Event Summary As part of our proactive and continuous monitoring services and threat research, we have seen widespread DDoS campaigns targeting businesses and government entities across the world. The hacktivist group, Killnet is heavily involved
Event Summary Two Zero-Day vulnerabilities (previously undisclosed but now linked to CVE-2022-41040 & CVE-2022-41082) are currently exploited by attackers to get Authorized RCE access on Microsoft Exchange Servers (2013, 2016 and 2019) Details Product Affected
History of Machine Learning The term Machine Learning (ML) has been around since the 1950s and has made a massive resurgence in the last five years. Gartner recently discovered that 42% of survey respondents did
(CVE-2022-32894 and CVE-2022-32893) Event Summary Apple is urging macOS, iPhone and iPad users to install the released update as soon as possible. The update includes
Threat Advisory: F5 Reports High Severity Vulnerabilities in Multiple Products Event Summary Multiple product vulnerabilities were reported by F5, including high, medium, and low severity
Zero Access Trust – The Vulnerability of Trust The year 2020 came to a close with the devastating SolarWinds Supply chain breach, affecting 18,000 of
Security On-Demand continues to closely monitor the rapidly evolving crisis in Ukraine. We are diligently preparing for cyberattacks related to this crisis to spread beyond
Event Summary Security On-Demand’s Threat Recon Unit continues to track the development of the log4shell vulnerability present in log4j, a nearly ubiquitous Java logging utility
Events Summary Researchers at Mandiant are tracking a suspected Russian campaign targeting government and business entities around the globe. Mandiant reports that the activity is
70% of threats today cannot be detected using static cyber security tools. Security On-Demand’s ThreatWatch® platform can detect the advanced threats that most providers miss.
Detect Early. Respond Early.
© 2014-2022 Security On-Demand. All Right Reserved