The Confusion Between Attack Surface Reduction and Vulnerabili…

Attack Surface Reduction was recently covered in an episode of Cyber Security America with our own Deep, Josh Nichols…

Read More

Alert Prioritization & Potential Hidden Risks: A Primer fo…

Some security leaders have had alert prioritization decisions made for them. Others are dealing with decisions that w…

Read More

Meet Our Deep: Richard Waller, DeepSeas Cyber Security Account…

Today, as part of a DeepSeas series called “Meet our Deeps,” we introduce you to Richard Waller, a DeepSeas Cyber Sec…

Read More

Meet Our Deep Cyber Security Experts: Ruben Mbon, CISSP, GCPM,…

In a DeepSeas series titled “Meet Our Deeps,” we introduce you to our cyber security experts who are serving in the c…

Read More

Cyber Security Operations Expert: Meet Dorian James, DeepSeas

In this new issue of the series “Meet Our Deeps,” we introduce you to a DeepSeas cyber security operations exper…

Read More

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly

OneNote Files Used for Malware Delivery, Actors Iterate Rapidly A DeepSeas Summary DeepSeas has identified a new tech…

Read More

FAA Reporting System Failure Grounding US Flights | DeepSeas A…

Yesterday was the first Patch Tuesday of the year, which some may speculate to be the cause of the FAA System Failure…

Read More

Cyber Defense News: Bracing for a Potential Russian Winter Off…

Potential for Russia to respond with cyber-attacks against U.S. organizations, such as financial, oil and gas, or man…

Read More

Linux Kernel ksmbd Use-After-Free Vulnerability

Summary: On 22 December 2022, a potential Remote Code Execution (RCE) vulnerability in Linux Kernel versions 5.15 &#8…

Read More

The DeepSeas are calling.
Book your virtual consult.

You pick the time and day. We’ll be ready to answer your questions.

Book with Calendly