Security On-Demand Received Top #21 Global Ranking in the 2022 MSP501 List. See the list here

UPDATED FLASH ALERT: Apache Log4shell Remote Code Execution Vulnerability

UPDATED FLASH ALERT: Apache Log4shell Remote Code Execution Vulnerability

Event Summary Security On-Demand’s Threat Recon Unit continues to track the development of the log4shell vulnerability present in log4j, a nearly ubiquitous Java logging utility present in Linux/Unix distributions and more. As the community predicted,

Read More
Nobelium Activity Targets Government and Business Entities

Nobelium Activity Targets Government and Business Entities

Events Summary Researchers at Mandiant are tracking a suspected Russian campaign targeting government and business entities around the globe. Mandiant reports that the activity is plausibly linked to Nobelium (APT29/Cozy Bear), the group behind the

Read More
How to Defend Against Denial of Service (DoS/DDoS) Attacks

How to Defend Against Denial of Service (DoS/DDoS) Attacks

There have been several recent reports regarding “Distributed Denial of Service” Attacks, which are also known as “DoS” or “DDoS” attacks. There were 972,000 DDoS attacks in January alone, which is higher than any other

Read More
2021  End of the Year Phishing Report

2021 End of the Year Phishing Report

2021 End of The Year Phishing Report Authored by Joel Garcia, Cyber Security Operator III 2021 has kept defenders on their toes. From the Solarwinds breach to the Colonial pipeline attack, cyber attacks and leaks

Read More
Building a Strong Security Culture

Building a Strong Security Culture

Far too often information security is treated like a necessary evil. Infosec does not generate revenue, there is no guarantee that a major breach will occur, and it costs a lot of money.  We often

Read More
Palo Alto Networks OS Memory Corruption Vulnerability

Palo Alto Networks OS Memory Corruption Vulnerability

Event Summary Palo Alto Networks (PAN) has released a security advisory regarding a critical vulnerability in PAN-OS firewall configurations with GlobalProtect portal or gateway enabled.  Threat actors can take advantage of this memory corruption vulnerability

Read More
PREV NEXT

What is AQ Technology?

AQ Technology is found in Security On-Demand’s ThreatWatch detection & analytics platform. How does AQ Technology make a difference in our threat detection tool? Well,

Read More »

Latest News

Sign-up to Receive Threat Flash Alerts & Advisories