ProxyToken: Authentication Bypass Vulnerability in On-Premises Microsoft Exchange
Background On August 30, 2021, Trend Micro’s Zero Day Initiative (ZDI) published a technical blog on CVE-2021-33766, a new vulnerability in Exchange also known as
The cybersecurity industry has an effectiveness problem. Despite new technologies emerging every year, high-profile breaches continue to occur. To prevent these attacks, the industry needs to adopt a new approach by focusing on security operations. That’s where Arctic Wolf can help.
Built on an open XDR architecture, the Arctic Wolf Platform® combines with our Concierge Delivery Model to work as an extension of your team, proactively protect your environment, and strengthen your security posture.
Security Expertise, Delivered
Our Arctic Wolf® Security Teams ensure we have a complete understanding of your unique IT environment right from the start.
Learn more about our unique approach to cybersecurity and why Arctic Wolf has emerged as a leader in the industry.
Ransomware Explained
Understanding ransomware — from its origins to its impacts to the TTPs that allow ransomware gangs to exploit victim organizations and make off with millions in ransom payments and extortion fees.Arctic Wolf Labs 2024 Threat ReportThe elite security researchers, data scientists, and security developers of Arctic Wolf Labs share forward-thinking insights along with practical guidance you can apply to protect your organization.Inside Our SOCLearn how our Concierge Security® and Triage Security Teams help end cyber risk. |
We envision a future without cyber risk. Every organization should be so effective at security operations that both the likelihood and impact of a cyber attack is minimized to the point where risk is essentially zero.
Background On August 30, 2021, Trend Micro’s Zero Day Initiative (ZDI) published a technical blog on CVE-2021-33766, a new vulnerability in Exchange also known as
Discover, benchmark, and harden your security across your networks, endpoints, and cloud environments.
Over the past five years, the number of vulnerabilities discovered each year has dramatically increased—and the modern attack surface has expanded well beyond the traditional
Background Microsoft has been dealing with a series of vulnerabilities in the Windows Print Spooler, a service that provides printer functionality on domain controllers —
Background On Tuesday, August 10, 2021, as part of the Microsoft Patch Tuesday release, security updates were made available to address the publicly documented exploit
Background On May 25, 2021, VMware published a security advisory for a new remote code execution (RCE) vulnerability in VMware vCenter Server tracked as CVE-2021-21985.
Background On April 20,2021 Ivanti, the parent company of Pulse Secure, released Pulse Connect Secure version 9.1R11.4 to address the zero-day vulnerability CVE-2021-22893, among 3
On Tuesday, April 13, Microsoft released security updates for four new critical remote code execution (RCE) vulnerabilities in on-premises Microsoft Exchange as part of its
Executive Summary On Wednesday, March 10, F5 released security updates for its BIG-IP & BIG-IQ product lines that addressed several vulnerabilities, including one unauthenticated remote
The window to patch your critical systems is shrinking. The White House says the Microsoft Exchange Server vulnerability has moved the time to patch from days to just hours to reduce the
Executive Summary On Tuesday, March 2, Microsoft released an out-of-band patch to address multiple remote code execution (RCE) vulnerabilities in Microsoft Exchange. Four of these
Executive Summary On Tuesday, February 9, Microsoft released patches for multiple vulnerabilities as part of its monthly “Patch Tuesday Release,” including one RCE vulnerability in
Executive Summary On Tuesday, February 23, VMware released an advisory and patch for a new remote code execution (RCE) vulnerability in VMware vCenter Server tracked
Executive Summary On Friday, January 22, SonicWall publicly disclosed a coordinated attack on its internal systems that it believes involved zero-day vulnerabilities in a number
Executive Summary On Wednesday, February 3, researchers at security firm TrustWave released a blog post detailing a new remote code execution (RCE) vulnerability in the
Arctic Wolf’s Concierge Security Team reveals frequently exploited vulnerabilities and how to start hardening your posture.
The dynamic abilities of Arctic Wolf Managed Risk with the Internal Vulnerability Assessment provide a more effective approach.
Gain insight on security controls benchmarking, and inventory and control of hardware and software assets.
Background On Tuesday, January 12, 2021, Microsoft released patches for 83 vulnerabilities across several Microsoft products which included 10 critical severity vulnerabilities. What’s notable about
Effective cybersecurity depends on three things: people, technologies, and processes. If even one of these pillars is lacking, all the investment in the world in
Cybersecurity is an increasing challenge. Hackers and bad actors use the most advanced tools and sophisticated techniques to target organizations of every size. As of
The cost-saving benefits of Managed Risk and why it’s an effective and scalable extension of your cybersecurity program.
Learn how Cloud Security Posture Management can protect an organization’s cloud environments.
Find insight into your current risk profile, unresolved risks, risk trends score, network and asset-class health, and more.
Discover how small to midsize businesses gain access to the required people, processes, and technology that comprise a SOC.
Researchers of the popular TV and movie streaming service Netflix have identified and resolved four major Linux and FreeBSD vulnerabilities. These vulnerabilities, associated with TCP
Imagine living in a sprawling mansion filled with valuables and never checking the doors, windows, and alarm system to make sure everything is secure. It
I am pleased to announce that Arctic Wolf Networks has acquired cybersecurity vulnerability assessment leader RootSecure. The acquisition allows us to expand our offerings. While
© 2024 Arctic Wolf Networks Inc. All Rights Reserved. |
||||||
Privacy Notice |
Terms of Use |
Cookie Policy |
Accessibility Statement |
Information Security |
Sustainability Statement |
Cookies Settings |