by Slade Griffin | Jun 3, 2022 | Uncategorized
What are we talking about? On May 30 CVE 2022-30190, https://nvd.nist.gov/vuln/detail/CVE-2022-30190, was issued by Microsoft. According to the Common Vulnerability Scoring System this is currently ranked as a high-severity vulnerability with a 7.8 out of 10. A...
by Slade Griffin | Mar 10, 2022 | Uncategorized
False positives can be difficult to disprove and even harder to understand. They stem from an automated product, like a vulnerability scanner, doing its best to determine whether a specific condition exists or not. Unfortunately, a lot of people end up trying to...
by Slade Griffin | Dec 7, 2021 | Uncategorized
Continuing with our #ExpectMore series, I want to explore some commonly used terms and what they might look like during a penetration test in your environment. “Visibility”, “Actionable Metrics”, these terms are frequently used in the cybersecurity world by vendors...
by Kevin Thomas | Nov 18, 2021 | Uncategorized
At Contextual Security Solutions we are continuously looking for ways in which we can better serve our customers. It has been a primary focus from day one, almost ten years ago. Whether it’s through the creation of our illumino Compliance...
by Richard G. | Apr 13, 2021 | Uncategorized
Organizations across all sectors rely on technology to run their businesses. It is a vital component that is necessary to handle nearly every aspect of the day-to-day workings of any business. With the presence of this technological integration comes the risk of...
by Richard G. | Mar 23, 2021 | Uncategorized
Long before rioters pushed and forced their way into the U.S. Capitol, a stealthier invader was lurking through the computers of government officials, stealing documents, monitoring emails, and setting up traps for future attacks. Foreign hackers, who top US officials...
Recent Comments