
High Severity WordPress Plugin Bug Hits Three Million
According to security experts, a popular WordPress plugin contains a bug that could compromise user data and even hijack vulnerable websites. The solution is to update as soon as possible. The plugin, UpDraftPlus, is commonly used to back up users' data. As a result,...

Security Concerns are Biggest Barrier to Cloud Adoption
The adoption of cloud-based services continues to accelerate. In fact, 97 percent of those surveyed in recent Confluera research indicated that their organizations expect to expand their cloud deployments. To that end, many are enhancing the scope and extent of their...

More Organizations Suffered Phishing Attacks in 2021 Than in 2020
Thanks to intense media focus on the issue, the end-users of digital products should be much more aware of the dangers of data breaches. Nevertheless, every indication is that cyber attacks such as phishing schemes continue to increase in severity. In fact, a...

Researchers Warn of New Log4Shell-Like Java Vulnerability
Security experts are driving our attention to the Log4Shell vulnerability in Java again. It has been around for several months. Although this new vulnerability known as CVE-2021-42392 has not yet been published in the National Vulnerability Database (NVD), experts are...

Google Docs Comments Exploit Allows for Distribution of Phishing and Malware
From students to corporate executives, workgroups of all types benefit from both Google Docs and the larger Google Workspace platforms. Due to the preponderance of remote work during the pandemic, groups have remained productive thanks to the productivity these...

Patch Log4j Now or Risk Major Fines
Your information security vigilance can never be allowed to flag. Recently, the Federal Trade Commission underscored the importance of that point about the newly discovered Log4 Shell vulnerability. Companies that fail to take preemptive action by installing a patch...

SOC 2 Cost In 2023
With cybersecurity concerns at an all-time high, organizations cannot afford to downsize or procrastinate when it comes to protecting your and your customer's systems and data. Combine these realities with an increase in the use of employee personal devices and remote...

Growing Amount of Phishing Attacks During the Holiday Season
Along with the good cheer and gifts that are hallmarks of the holiday season comes a much less welcome phenomenon: phishing attacks. The vast majority, well over 90 percent, are conducted through a company’s email system. During that high-traffic time between...

TrustNet’s Response to Log4j Vulnerability CVE-2021-44228
On December 9, 2021, TrustNet security officials became aware of a vulnerability in the Log4j logging framework, CVE-2021-44228. Log4j is a frequently used open-source utility distributed under the Apache Software License used within Java applications to generate...

TSA Requires Rail and Airports to Strengthen Cybersecurity
Earlier this year, a ransomware attack on the Colonial pipeline severely interrupted the country’s fuel distribution system. In response, regulations were implemented in May that strengthened the cybersecurity infrastructure of the pipeline system. In light of this...