|
Back to the Basics

As someone who has spent over 25 years in the IT and information security field, I have seen a lot of changes and trends come and go. But one thing that has remained consistent throughout the years is the importance…
|
As someone who has spent over 25 years in the IT and information security field, I have seen a lot of changes and trends come and go. But one thing that has remained consistent throughout the years is the importance…
As the CEO and Founder of ThreatHunter.ai, and known in some circles as the Whiskey Hacker, I’ve dedicated my life to creating an innovative cybersecurity solution that tackles common challenges like alert fatigue, improper system tuning, outdated threat intelligence, and…
In today’s world, businesses face an ever-increasing number of cyber threats, ranging from ransomware attacks to zero-day vulnerabilities. With the rise of threat actors and their advanced tactics, businesses need to be proactive in their approach to cybersecurity. That’s where…
Cybersecurity is more complex than ever, with threats evolving and becoming more sophisticated every day. That’s why ThreatHunter.ai is proud to announce the launch of its comprehensive FIVE EYES cybersecurity solution, designed to provide complete coverage and protection against all…
Happy Tuesday ! Rev up those patching engines, WSUS and SCCM! Microsoft has just released updates for a whopping 109 vulnerabilities! Out of those, 9 are critical, and you need to pay attention to two of them right away. The…
I want to share something I sent internally today to everyone at Milton I think we all forget to be proud of our accomplishments, in every part of our life. I am so proud of what everyone has done at ThreatHunter.ai has…
Fortinet has released security advisory FG-IR-22-398, warning that the heap-based buffer overflow vulnerability in its FortiOS SSL-VPN has been actively exploited in attacks. The company recommends that all users update to the following versions to fix the bug: FortiOS 6.4.3…
December 6, 2022 In today’s digital world, businesses of all sizes are under constant threat from cyber attacks. From fishing, phishing, vishing to ransomware and malware, attackers are using increasingly sophisticated tactics to breach networks and steal sensitive and ransom…
Here’s a Friday tech tip before you head out for the weekend. You know how your users (and sometimes even yourself) get locked out of their accounts, and they don’t know where they logged in exactly? Going to the AD…
You’re sitting on the beautiful Palm Beach in Aruba, the waves gently lapping onto the shore. The sun is shining and your skin is soaking up every last ray while you’re sipping on your White Whiskey Punch. Suddenly there is…