by Tibor Luter | Aug 22, 2022 | blog
The fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being actively exploited heightens the need for a quick response. Security researchers are urging users of Apple Mac, iPhone, and iPad devices to immediately...
by Tibor Luter | Sep 1, 2021 | blog
If you think about “supply chain attack” and “HVAC,” you will probably immediately think of the headline-making Target breach of 2013. But that wasn’t the only breach via a third-party HVAC vendor. Just this month, several hospitals in Boston may have narrowly...
by Tibor Luter | Sep 25, 2020 | blog
[vc_row][vc_column][vc_wp_text] [xyz-ips snippet=”metadatatitle”] [/vc_wp_text][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][/vc_column][vc_column width=”1/3″][vc_wp_text][xyz-ips...
Recent Comments