*Important note: These are not the only vulnerabilities that have been recently released; however, these are the vulnerabilities RedLegg has identified as critical and require immediate attention.
Every day cyber threat actors attempt to find vulnerabilities in connected devices, networks, and enterprise systems.
While connectivity is an essential lifeline of modern-day enterprises and institutions, we can't forget that it also ...
*Important note: These are not the only vulnerabilities that have been recently released; however, these are the ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
About: In an effort to provide additional value to our customers RedLegg will be releasing monthly security bulletins ...
As the cybersecurity field continues to evolve and become more specialized, even experienced IT professionals may ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
Implementing Security Information and Event Management (SIEM) into your organization's infrastructure can be a valuable ...
With the increasing frequency of cyber attacks, businesses that have not prioritized their cybersecurity efforts are ...
SIEM technology helps to provide a much needed window into the logging and alerting activity taking place in your ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
To thoroughly assess an organization's security, a robust penetration testing methodology should be employed. This ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
About: In an effort to provide additional value to our customers RedLegg will be releasing monthly security bulletins ...
About: RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide ...
Oracle Fusion Middleware Unspecified Vulnerability Identifier: CVE-2022-35587 Exploit or POC: Yes (Actively Being ...
Google Chrome Heap Buffer Overflow Vulnerability Identifier: CVE-2022-4135 Exploit or POC: Yes (Actively Being ...
Cyber attackers, ranging from nation-states to vigilante groups, have employed Denial of Service (DoS) attacks, causing ...
About: In an effort to provide additional value to our customers RedLegg will be releasing monthly security bulletins ...
Securing your network is an ongoing responsibility that necessitates ongoing scanning for potential threats, evaluating ...
X.509 Email Address 4-Byte Buffer Overflow Vulnerability Identifier: CVE-2022-3602 Exploit or POC: No Update: ...
ABOUT In recognition of Cyber Security Awareness Month, RedLegg’s 96 Bravo team will be providing security focused ...
ABOUT In recognition of Cyber Security Awareness Month, RedLegg’s 96 Bravo team will be providing security focused ...
When it comes to vulnerability scanning, Nessus is a popular platform. However, to avoid errors and oversights during ...
ABOUT: In recognition of Cyber Security Awareness Month, RedLegg’s 96 Bravo team will be providing security focused ...
Apache Commons Text Remote Code Execution Vulnerability Identifier: CVE-2022-42889 Exploit or POC: No Update: ...
Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability Identifier: CVE-2022-37968 Exploit or ...
Fortinet FortiOS & FortiProxy Authentication Bypass Vulnerability Identifier: CVE-2022-40684 Exploit or POC: No ...
As the threat of cyber attacks continues to escalate, organizations must invest time and effort into building a sturdy ...
Atlassian Bitbucket Server and Data Center Vulnerability Identifier: CVE-2022-36804 Exploit or POC: Yes (Actively Being ...
Microsoft Exchange Server Server-Side Request Forgery (SSRF) Vulnerability Identifier: CVE-2022-41040 Exploit or POC: ...
The modern workforce is becoming more mobile, and it's now common to use personal devices for work purposes. This ...
Vulnerability scanning, also known as vuln scan, is a crucial process that involves identifying possible exploits, ...
As the years go by, companies of all sizes are increasingly worried about cybersecurity risks. However, if you rely ...
About On December 9th, 2021, a severe vulnerability (CVE-2021-44228) was released for the widely utilized Apache Log4j ...
LOG4J Remote Code Execution Vulnerability (Update) Identifier: CVE-2021-44228 and CVE-2021-45046 Exploit or POC: YES. ...
LOG4J Remote Code Execution Vulnerability (Update) Identifier: CVE-2021-44228 and CVE-2021-45046 Exploit or POC: YES. ...
LOG4J Remote Code Execution Vulnerability Identifier: CVE-2021-44228 Exploit or POC: YES. Update: ...
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability Identifier: CVE-2021-26443
Microsoft Exchange Server Remote Code Execution Vulnerability Identifier: CVE-2021-26427 Exploit or POC: No. Update: ...
Open Management Infrastructure Remote Code Execution Vulnerability Identifier: CVE-2021-38647 Exploit or POC: No. ...
Microsoft MSHTML Remote Code Execution Vulnerability Identifier: CVE-2021-40444 Exploit or POC: Yes Update: ...
Windows Update Medic Service Elevation of Privilege Vulnerability Identifier: CVE-2021-36948 Exploit or POC: Yes. ...
Windows Print Spooler Remote Code Execution Vulnerability Identifier: CVE-2021-34527 Exploit or POC: Yes. Update: ...
Kaseya's VSA Product Supply Chain Attack & Ransomware Event
What is MDR? Managed Detection & Response is a proactive service. With MDR, the analyst is actively looking for ...
Did you catch the latest security news? Check out the 4 news links that caught our team's attention this month.
How do these critical vulnerabilities affect your business? See the latest bulletin from our threat research team.
Did you catch the latest security news? Check out the 5 news links that caught our team's attention this month.
Did you catch the latest security news? Check out the 16 news links that caught our team's attention this month.
The crowd-favorite SIEM workshop is back for those looking to advance their skills and optimize their LogRhythm ...
Whether your organization has a CISO or someone looking after CISO-level responsibilities, we've provided a few news ...
How do these critical vulnerabilities affect your business? See the latest bulletin from our threat research team below.
It has been brought to RedLegg’s attention that the breaches at Fireeye, The Treasury Department, and The Commerce ...
Do any of these critical vulnerabilities affect your business?
After reviewing all the released details regarding the FireEye security breach, RedLegg recommends all customers with ...
In this month's security bulletin, we had a few active exploits*. Do any of these critical vulnerabilities affect your ...
Is your team tackling vulnerabilities across all three categories to best protect your organization?
In this month's security bulletin, we've got a whopping 17 critical vulnerabilities described. Do any of these affect ...
As those in the Defense Industrial Base (DIB) look into the CMMC requirements, what exactly are the different levels of ...
The crowd-favorite SIEM workshop is back as a virtual 1-day bootcamp, featuring two new talks for advanced users of the ...
Honored as a leading MSSP, MDR cybersecurity company worldwide.
There are quite a few remote code execution vulnerabilities revealed in the latest security bulletin provided by our ...
Whether your organization has a CISO or someone looking after CISO-level responsibilities, we've provided a few news ...
The Defense Industrial Base (DIB) will soon be mandated to meet new security requirements in Department of Defense ...
We're reviving an oldie-but-a-goodie this week as we revisit the heart of Critical Infrastructure Protection and SCADA ...
Chicago, IL, August 20, 2020 — RedLegg announced today that they have replaced their home-grown automation and analysis ...
Whether your organization has a CISO or someone looking after CISO-level responsibilities, we've provided a few news ...
Check out last month's list of critical vulnerabilities provided by RedLegg's threat research team.
A vulnerability scan should be concentrated on compiling a complete catalogue of vulnerabilities that affected the ...
Whether your organization has a CISO or someone looking after CISO-level responsibilities, we've provided a few news ...
Join us in our upcoming events – Learn new things, compete with your colleagues, and meet some new faces this July!
Anomali is hosting a virtual cyber threat intelligence briefing with Flashpoint and RedLegg. Industry thought-leaders ...
In your efforts to fix, and be prepared for, everything, here's RedLegg's cyber news update, featuring the articles ...
Thank you to everyone who registered and attended our latest Happy Hour Club meeting!
Your organization's cybersecurity team can gather threat intelligence through various ways, such as through open-source ...
RedLegg, global and veteran-owned cybersecurity firm based in the Chicago-area, has an updated SOC 2 certification with ...
The FBI introduces three fraud schemes in their latest PSA that they've seen trend during this season of the ...
As the US is responding to the Coronavirus pandemic, companies and government/non-government organizations are ...
Access Experts Live – Wednesday, March 11th @ 2 p.m. CST What is often considered the overlooked portion of your ...
It’s been a bit more than a year since GDPR took effect, but many organizations have yet to build their compliance ...
Many organizations, maybe even yours included, have major flaws in their security operations. To help solve your ...
Are you using the full extent of your resources in order to get your work done?
When you're tasked with securing your customers' rich data, and you don't have 100% access to your own systems, you're ...
We're turning the MDR vs SIEM argument on its head! MDR may be the new buzzword around town, but at the end of the day, ...
We like to say, consistent communication provides peace of mind. The same should be said when it comes to your managed ...
When you're tasked with overseeing governance, risk management, compliance, and the firm's security technologies along ...
In previous articles, we’ve reviewed what the OWASP Top 10, testing guide, and ASVS are as well as how they may guide ...
In a previous article, we explored OWASP Top 10, testing guide, and ASVS, but how does OWASP apply to your security ...
Open Web Application Security Project (OWASP) Top 10 was created to show the critical risks facing applications, was ...
Although vetting your potential SIEM service providers is an important task, for obvious reasons, we find that the ...