With phishing attacks playing a major role in the attacks we’ve seen this year, and the increase of attacks playing off the pandemic, it’s more important than ever to instil the basics of cyber security in your teams, especially if they’re working from home and perhaps less in the loop with training and common phishing attempts.
Speed was of the essence with this job, so cloud-based computing was the only way to achieve this speed. We used Tableau on Amazon Web Services (AWS) to visualise the dataset in this very tight timeframe resulting in visualisations that are available for both the public and organisations to use.
COVID-19 repercussions are coming and good companies will be laser focused on the clients; great companies will do this by embracing data platforms and analytics. Director of Financial Services, Chris Mills explains how to value your client through data excellence.
One common term that is often seen in CVEs relating to the heap is "use-after-free". The use-after-free vulnerability exploits a mistake made by the original author of a software and can result in devastating effects that range from remote code execution to the leaking of sensitive data. In this blog I'll explain what a use-after-free vulnerability is and how it works...