SECURITY BULLETIN

Critical Vulnerabilities

Emergency Security Bulletin: Apache Tomcat Path Equivalence...

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Patch Tuesday - March 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: VMWare ESX Product Vulnerabilities

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Emergency Security Bulletin: FortiOS and FortiProxy Authentication...

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Emergency Security Bulletin: Ivanti Connect Secure and Policy Secure...

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Patch Tuesday - February 2025

*Important note: These are not the only vulnerabilities that were recently released; however, these are the...

Read More

Emergency Security Bulletin: Cisco Identity Services Engine (ISE)

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Emergency Security Bulletin: SonicWall SMA1000 Appliances

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Emergency Security Bulletin: Multiple SAP NetWeaver Vulnerabilities

About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide...

Read More

Sample PHI HIPAA Risk Technology Assessment for a...

Engagement Objectives Our goal wasn’t just to provide a checklist of risks but to deliver real,...

Top 8 Cyber Threat Maps to Monitor Global Cyber Attacks

Improving OT Security in Food & Agriculture: A RedLegg Case...

This case study examines how RedLegg’s advisory team assessed and improved the OT security posture...

4 Essential Business Cybersecurity Testing Strategies

Effective Vulnerability Scanning: 6 Essential Steps

Threat Intel: ATP27, FRP, TTNG, and More…

EXECUTIVE SUMMARY THREAT INTELLIGENCE AT REDLEGG This report serves as a comprehensive resource,...

9 Ways to Leverage SIEM Integration for Faster and More...

Introduction to SIEM Integration Security Information and Event Management (SIEM)technology...

THREAT PROFILE: SILK TYPHOON

THREAT TYPE(S):State-Sponsored Threat PLATFORMS EFFECTED:Windows ALIASES:Exchange Marauder,...

EDR vs. SIEM: Prioritizing Your Security...

Choosing the right security strategy is crucial to mitigating these threats effectively. Among the...

Identity and Access Management Best Practices: 5 Tips for...

The modern enterprise is rooted in data—and the security of this data is paramount.

Summoning Cyber Awareness: Exorcising the Malevolent Realm...

EXECUTIVE SUMMARY RedLegg would like to recognize the efforts instituted by the Cybersecurity &...

Nessus Scanner Best Practices For Common Issues

As our networks, systems, devices, and apps proliferate, the potential attack surfaces available for

How to Prevent Denial of Service Attacks: 3 Tools to Test...

Top 12 Mobile App Penetration Testing Tools and Services

External vs Internal Pen Tests: Why Both Are Important For...

img-decoration

REACH OUT

We're here to help. Talk to an expert

Contact Us
img-decoration