Blog - TSP

CISA catalog now includes SolarWinds Help Desk software vulnerability

Three vulnerabilities have been added to the Known Exploited Vulnerabilities Catalogue by CISA due to evidence of active exploitation. These vulnerabilities are: Microsoft Windows Kernel TOCTOU Race Condition Vulnerability (CVE-2024-30088)  Mozilla Firefox Use-After-Free Vulnerability (CVE-2024-9680)  SolarWinds Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)  These vulnerabilities are frequent attack vectors for malicious actors and pose a […]

Top Five Injection Attacks in Application Security

What are injection attacks? Injection attacks refer to any type of attack that targets injection vulnerabilities—a broad category of cybersecurity weaknesses that includes several of the most serious application security risks. While you could argue it’s an artificial way to group otherwise unrelated attacks, the OWASP Top 10 for 2021 took this exact approach, naming […]

Supply Chain Attacks Affecting 68% of Healthcare Workers

An analysis of the impact of cybersecurity incidents on healthcare organizations was conducted in a recent report by Proofpoint. The report reveals that 92% of healthcare organizations surveyed experienced at least one cyber attack in the past year, up from 88% in 2023, with 69% reporting disruptions to patient care. Among those affected by the […]

Study identifies potential risks to 2024 Presidential Election from threat activity

Research released by Fortinet’s FortiGuard Labs highlights the current threats related to the 2024 United States Presidential Election. The research provides a detailed analysis of threats that could impact the electoral process, such as: Phishing scams  Ransomware activity  Malicious domain registration  Security leaders discuss threats to the election Casey Ellis, Founder and Chief Strategy Officer […]

Employees’ Personal Information Could be Exposed by New iPhone Feature

Security researchers have identified a potential privacy issue with Apple’s new “Mirroring” feature that could potentially reveal an employee’s personal applications to their company’s software inventory. While the actual data within the apps is not shared, the presence of certain apps could expose sensitive information about the employee. Jason Soroko, Senior Fellow at Sectigo, detailed […]

Phishing Ranks as Top Security Concern for Over Half of Tech Leaders

Security threats were analyzed in a recent report by O’Reilly. The report found that 33.9% of tech professionals report a shortage of artificial intelligence (AI) security skills, particularly around emerging vulnerabilities like prompt injection. Despite cloud computing’s two-decade presence, 38.9% of respondents identified cloud security as the most significant skills shortage. This revelation underscores a […]

38% of organizations face critical exposure risk

The Tenable Cloud Risk Report 2024 highlights the current risks associated with cloud environments. The report indicates that 38% of organizations globally are facing critical exposures due to various security shortcomings. These organizations are vulnerable to a combination of highly privileged, critically vulnerable, and publicly exposed cloud workloads, known as the “toxic cloud triad.” These […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC