Our Latest News

Drupal Releases Security Updates

Drupal has released security updates to address a Guzzle third-party library vulnerability that does not affect Drupal core but may affect some contributed projects or custom code on Drupal sites. Exploitation of this vulnerability could allow a remote attacker to...

Vulnerability Summary for the Week of June 6, 2022

0day.today -- opennetadmin  A vulnerability was found in OpenNetAdmin 18.1.1. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to privilege escalation. The attack may be launched remotely. The exploit has...

When to use Azure Data Explorer

When to use Azure Data Explorer

Azure Data Explorer is a big data interactive analytics platform that empowers people to make data driven decisions in a highly agile environment. The factors listed below can help assess if Azure Data Explorer is a good fit for the workload at hand. These are the key...

Forthcoming Upgrade to HBv2 VMs for HPC

Forthcoming Upgrade to HBv2 VMs for HPC

At Supercomputing 2019, we announced HBv2 virtual machines (VMs) for HPC with AMD EPYC™ 'Rome' CPUs and the cloud’s first use of HDR 200 Gbps InfiniBand networking from NVIDIA Networking (formerly Mellanox). HBv2 VMs have proven very popular with HPC...

Google Releases Security Updates for Chrome

Google has released Chrome version 102.0.5005.115 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system. CISA encourages users and administrators to review the Chrome Release...

CISA Adds Three Known Exploited Vulnerabilities to Catalog  

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal...

I'm Being Attacked, Now What?

I'm Being Attacked, Now What?

There is no shortage of incident response frameworks in the security industry. While the processes may vary, there is relatively universal agreement on requirements to remediate an incident and conduct lessons learned. Remediation falls towards the end of the incident...

CISA Adds 36 Known Exploited Vulnerabilities to Catalog 

CISA has added 36 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise....

Recent Comments

    Dr Ware Technology Services

    We look forward to meeting you

    Phone Number: 843 573 0970
    Toll Free: 83DRWARE83 or (833) 792-7383

    Contact Us