Unauthenticated vulnerability scan coverage was released on May 5, 2020, to identify vulnerable assets without credentials.
Overview Alert Logic® is actively investigating new vulnerabilities in the open-source Salt management framework – CVE-2020-11651 and CVE-2020-11652. These vulnerabilities allow full remote code ex...
Overview Alert Logic has analyzed 240 popular pieces of ransomware released in the last few years and found that the majority infect through phishing attacks. During this analysis, we discovered t...
Note: This article applies to Alert Logic® Managed Detection & Response customers who have opted into the new Alert Logic console. For more information on the new console experience, see the Improv...
Alert Logic® Managed Detection and Response has been certified by the Center of Internet Security (CIS) for the Microsoft Azure Foundations Benchmark. The CIS Microsoft Azure Foundations Benchmark ...
In This Article Overview Managing Your Incident Notifications and Escalation Contacts Use Distribution Lists for Incident Notifications Properly Offboard Users Regularly Verify Escalation Contac...
Permanent fixes for Citrix ADC versions 11.1 and 12.0 are now available as downloads from Citrix. For more information, refer to updates provided by Citrix. Additionally, Citrix has moved forward ...
Overview Alert Logic® is actively researching a vulnerability (CVE-2019-19781) in Citrix Application Delivery Controller (ADC) and Citrix Gateway, formerly known as NetScaler ADC and NetScaler Gate...
In This Article Description What Is Phishing and How Does It Work? Who Is a Target? Common Phishing Themes and Indicators Practical Advice Additional Resources Description Phishing is a social en...
It is important to understand the relationship between parent and child accounts to understand how users are provided access to account data. Consider the following example: Account A as the pare...