<img height="1" width="1" src="https://www.facebook.com/tr?id=3212881575388825&amp;ev=PageView &amp;noscript=1">

Critical Patches for SAP ASE and VMware Cloud Director

Critical patches for SAP Adaptive Server Enterprise and VMware Cloud Director were recently released. The SAP ASE vulnerability, left unpatched, would…

Why a Firewall and Antivirus Aren’t Enough to Keep You Secure

“I’ve got a firewall and an antivirus program; that’s enough to keep me secure, right?” Well… that’s half-right. In this video, Zack Abdou, one of our…

Confessions of a Social Engineer: Why You're Not As Safe As You Think

A recent Verizon study found that 33% of data breaches are caused by phishing or social engineering attacks. Why is social engineering so successful? It…

New Vulnerability: Critical Cisco Bug in Unified CCX

Cisco recently announced discovery of a critical bug in Unified CCX, its management program for customer interaction. This vulnerability could allow a…

Recent Increase in Brute Force Attacks on RDP: How to Protect Your Data

Cybersecurity firm Kaspersky recently noted a significant increase in brute force attacks against those using remote access tools, especially Remote…

New Vulnerability: WP Product Review Lite Plugin

At SOCBOX, we are always on the alert for important news and new vulnerabilities that have the potential of impacting our partners.  

What Will Your Business Look Like Post-Pandemic?

Many businesses have been forced to make dramatic changes due to the virus outbreak—most notably, the rapid shift to remote work. This is not a simple…

8 Cybersecurity Myths Debunked

Cybersecurity is often treated like the vitamin of the IT world: businesses know they should have it, but it’s easy to forget, and owners find it hard to…

COVID-19 Phishing Attacks: Safety Tips for Uncertain Times

Whenever there’s a big event with widespread awareness and human impact, it’s inevitable that online criminals will follow. It happens like clockwork…

3 Steps of the Security Incident Response Plan

When a security incident disrupts normal operations, the burst of activity can get hectic and confusing. Teams are trying to determine the cause, isolate…