ANNOUNCEMENT: Security On-Demand Announces Grant Award of $1.2 Million | SEE RELEASE →

Atlassian Confluence Server and Data Center RCE Vulnerability

Atlassian Confluence Server and Data Center RCE Vulnerability

Atlassian Confluence Server and Data Center RCE Vulnerability 3 September, 2021 Executive Summary Atlassian Confluence and the U.S. Cyber Command have issued a security advisory regarding an OGNL injection vulnerability that exists in multiple versions

Read More
Microsoft Azure Cosmos DB Primary Key Exposure

Microsoft Azure Cosmos DB Primary Key Exposure

Microsoft Azure Cosmos DB Primary Key Exposure 27 August, 2021 Executive Summary Microsoft has disclosed an issue in their flagship Azure Database, Cosmos DB.  Wiz Research Security’s research team discovered the ability to access the

Read More
“ProxyShell” & “ProxyLogon” Patch Reminder

“ProxyShell” & “ProxyLogon” Patch Reminder

“ProxyShell” & “ProxyLogon” Patch Reminder Patch Notice Summary Security On-Demand’s Threat Recon Unit is issuing a patch reminder for vulnerabilities that exist in Microsoft Exchange servers.  We have previously reported on these patches and recommend

Read More
The Internet of Things: A New Opportunity for Hackers

The Internet of Things: A New Opportunity for Hackers

The Internet of Things: A New Opportunity for Hackers The Internet of Things is an exciting and innovative technological evolution that is changing the way we live, do business, and interact.  The IoT provides improvements

Read More
2021  Mid-Year Phishing Report

2021 Mid-Year Phishing Report

2021 Mid-Year Phishing Report Authored by Joel Garcia, Cyber Security Operator III at Security On-Demand As the world re-opens and employees make the transition back to some normalcy, scammers remain hard at work to score

Read More
Out with IP, In with DNS for Security Operations

Out with IP, In with DNS for Security Operations

  Out with IP, In with DNS for Security Operations DNS is a critical protocol for the success of security operations. It contains valuable indicators that identify malicious activity such as malware command and control,

Read More
PREV NEXT

Latest News

Sign-up to Receive Threat Flash Alerts & Advisories