Question: How can organizations effectively communicate with users and external stakeholders in a security incident?Ashley Sawatsky, Senior Incident Response Advocate, Rootly: No matter...
Dec 21, 2023NewsroomVulnerability / Phishing Attack
Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of...
The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication....