Schedule a Demo of GateKeeper Enterprise or call 240-547-5446

Developers Learn that Downloading Docker Hubs is Not Always Safe

Docker is the latest in popular technology where developers can quickly configure and deploy containers in an environment without affecting other components of an application. It’s a way to turn monolithic code bases into compartments that work individually on the network. Docker is one container provider that works in the cloud and makes it easier…

Read More

Corporations Lose Data in Ways They Didn’t Imagine

Insider threats make up a large portion of cyber security risk. It’s a third of the risk when you manage sensitive data on your network. Most organizations think of cyber security risk and insider threats as malicious employees, but it’s not always malicious intent that leads to data loss. Negligence, phishing, malware, and other events…

Read More

Malicious Browser Extensions Contribute to Insider Threats

Network administrators have a unique challenge of providing users with an efficient working environment that also protects against threats to network security. Most administrators block random installations, but this can be a problem when users need to customize their desktops to work productively in the way that they prefer. This customized environment includes the ability…

Read More

Chrome and Firefox Exploits using CSS and HTML5

Insider threats come in all different shapes and sizes, and many times it’s not malicious in any way even though they come directly from your own employees. A recent vulnerability found in Firefox and Chrome gave attackers access to images from the popular social media site Facebook. The vulnerability was mainly from the advanced HTML5…

Read More

Routers Under Attack from Russian Hackers

One common element of all networks is the existence of routers. These devices weren’t always used in household networks, but they soon became commonplace with any home network. Because they are so commonplace, hackers have gone after home routers with numerous different attacks. Some attacks make routers a part of a botnet. Others sniff data…

Read More

Attackers Still use Drupalgeddon2 Vulnerabilities for Cryptojacking

A vulnerability in Drupal’s content management system was found weeks ago, but as with many patches site owners either don’t know that they need to patch their software or they disregard it as unnecessary.  Unfortunately, this is the crux of a widespread problem in recent days that indicate more attackers are using the Drupalgeddon2 exploit…

Read More

Pin It on Pinterest