Threat & Research Team Blog
- CMMC
- Vulnerabilities
- Government
- Security operations
- OT Security
- Compliance
- SOC
- Artificial Intelligence
- ThreatHunting
- Vulnerability Management
- Industrial Control Security
- Ransomware
- Cyber Security Compliance
- Zero-Day
- NIST 800-171
- Critical Infrastructure
- threat advisory
- Penetration Testing
- Emerging Threats
Managing Cybersecurity Risk for Small Government Agencies: Double Extortion Explained
Managing Cybersecurity Risk for Small Government Agencies: Double Extortion Explained Cybercriminals are increasingly targeting small public administration offices instead of large, federal-level targets.
MOVEit Transfer Critical Vulnerability Discovered – Patch Now
A critical vulnerability has been found in Progress MOVEit Transfer, posing a significant risk of unauthorized access and elevated privileges through SQL injection. The impact of this vulnerability has been felt across various sectors, including government, finance, media, aviation, and healthcare. The severity of the situation is highlighted by reports of data theft and exfiltration from prominent organizations within these industries.
MAVERC WELCOMES TWO NEW CUSTOMERS INTO OUR MANAGED SOC SERVICES
CAN CMMC SAVE GLOBAL DEMOCRACY?
MAVERC selected to provide CMMC remediation and consulting services to Manufacturers in the state of Virginia
Tips for preparing for Cyber Security Maturity Model Certification (CMMC)?
Maverc will be posting several articles and the latest news with guidelines on getting ready for CMMC, a new cyber security standard for defense contractors on our blog. Let’s start with an summary of CMMC and how to get started with piloting the certification process.
In the Cyber Trenches: Threat hunting for Windows Authentication Attacks
Threat hunting has developed into one of the more essential
functions of mature security establishments – a rare
skill that enables them to address gaps in passive
security solutions. But at first, threat hunting can be a
daunting endeavor. On our blog Maverc will be frequently dropping content related threat hunting and how to use it to help guide security practitioners.
What role will Manufacturing Extension Partnerships (MEP) play in CMMC and NIST Compliance?
Established by the National Institute of Standards and Technology (NIST) in 1988, the Manufacturing Extension Partnership program, or MEP, is a national network created to support US supply chain manufacturers with organizational growth,