What are the roles of Security Liaison managers?

Security Liaison Managers act as a bridge between an organization’s security team and other departments, external partners, or stakeholders to ensure effective security practices and compliance. Their roles typically include: •  Coordination and Comm…

Why Zero-Day Vulnerabilities Are more Dangerous?

Zero-day vulnerabilities are critical because they represent security flaws in software or hardware that are unknown to the vendor and unpatched, making them prime targets for attackers. Below, I’ll explain why they’re so dangerous in a concise yet co…

What are the top Attack Surface Management Tools for 2025?

Attack Surface Management (ASM) involves continuously identifying, monitoring, and mitigating vulnerabilities and potential attack vectors across an organization’s digital assets (e.g., hardware, software, cloud services, and third-party systems). ASM…

What are the common vulnerabilities in SMB?

SMB’s widespread use and historical design flaws have made it a frequent target for attacks.  Below are notable vulnerabilities, including those relevant to networked environments where UEFI might interact with SMB: 1.  EternalBlue (CVE-2017-0144) : …

What is SMB?

The Server Message Block (SMB) protocol is a network file-sharing protocol that allows applications and users to access files, printers, and other resources on a remote server over a network. It is primarily used in Windows environments but is also s…

More posts
That is All