ANNOUNCEMENT: Security On-Demand Announces Grant Award of $1.2 Million | SEE RELEASE →

How to Identify a Phishing Email

How to Identify a Phishing Email

How to Identify a Phishing Email 20% of employees click on phishing links (Terranova Security). Teaching your employees how to identify a phishing email through regular phishing awareness training can make all the difference. In

Read More
Active VPN Reconnaissance Campaign from Russia Based IP

Active VPN Reconnaissance Campaign from Russia Based IP

Active VPN Reconnaissance Campaign from Russia Based IP Event Summary Security On-Demand has discovered a Russian based IP performing an active VPN scanning and password spraying campaign.  This IP was observed performing this activity as

Read More
‘Fancy Product Designer’ Website Plugin Zero-Day Vulnerability

‘Fancy Product Designer’ Website Plugin Zero-Day Vulnerability

‘Fancy Product Designer’ Website Plugin Zero-Day Vulnerability 2 June, 2021 Event Summary On May 31, 2021, the WordFence Threat Intelligence team discovered and disclosed a critical file upload vulnerability in ‘Fancy Product Designer’ plugin.  This

Read More
Threat Flash Alert: Nobelium Spear-Phishing Campaign

Threat Flash Alert: Nobelium Spear-Phishing Campaign

Threat Flash Alert: Nobelium Spear-Phishing Campaign Executive Summary Microsoft’s Threat Intelligence Center (MSTIC) has released an advisory pertaining to a new Spear-Phishing campaign by the Russian threat group dubbed Nobelium.  Nobelium has been labeled responsible

Read More
Threat Flash Alert: RCE Vulnerability in VMWare Center

Threat Flash Alert: RCE Vulnerability in VMWare Center

Threat Flash Alert: RCE Vulnerability in VMWare Center Event Summary VMWare has released a critical advisory regarding multiple vulnerabilities in their vCenter machines using the default configuration.  This affects the vSphere Client (HTML5).  This vulnerability

Read More
SIEM vs SOC: How to Make Your Threat Detection More Effective with a Managed Security Provider

SIEM vs SOC: How to Make Your Threat Detection More Effective with a Managed Security Provider

SIEM vs SOC: How to Make Your Threat Detection More Effective with a Managed Security Provider Security monitoring and detection is a critical element of having a secure environment. You need visibility into what is

Read More
PREV NEXT

Latest News

Sign-up to Receive Threat Flash Alerts & Advisories