Maidar Secure Advisory: SMM Driver Input Validation Vulnerability CVE-2022-48189 in ThinkPad BIOS
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, as it can result in an attacker with local access and elevated privileges to execute arbitrary code. To safeguard against this risk, it is imperative […]
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability CVE-2022-48189 in ThinkPad BIOS
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, as it can result in an attacker with local access and elevated privileges to execute arbitrary code. To safeguard against this risk, it is imperative […]
Artificial Intelligence in The Security Operations Center (SOC): Empowering B2B Cyber Security
In today’s rapidly evolving digital landscape, businesses face constant threats from cybercriminals seeking to exploit vulnerabilities in their systems. As organisations strive to protect their sensitive data and infrastructure, one technology stands out as a powerful ally: Artificial Intelligence (AI). Despite the polarised opinions surrounding AI, this article aims to shed light on its realistic […]
How a Security Operations Centre Enhances Your Security Awareness Efforts
In today’s digital landscape, organisations face a constant barrage of cyber threats that can disrupt operations, compromise sensitive data, and damage reputations. To safeguard against these risks, businesses employ various security measures, including security awareness initiatives and security operations centres (SOCs). While these functions differ in their roles, they share a common goal of protecting […]
Why SOAR is important… How is it different… How it helps your organisation
Many organisations today want to harness the power of automation to rid themselves of redundant and tedious tasks. Triaging alerts into incidents or initiating the overly complex process of blocking a known threat actor on the perimeter, take a lot of time, and these tasks can easily be done by an automation solution that frees […]
SIEM… is it over? Is there a legacy?
In today’s ever-evolving technological age where everyone has the power to innovate, develop, design, enforce, implement, multiply, evolve, and increase, things are becoming unmanageable. Simply put, there is no control. And then there is the flip side of the coin, where organisations simply stick to what they know. There is no innovation and no development […]