Home Tags Vulnerabilities

Tag: Vulnerabilities

6 Things CISOs Must Do to Mitigate Risks from Log4j

Log4j has been tagged by security vendor Tenable as the "single biggest, most critical vulnerability of the last decade." MITRE rated the vulnerability as...

Microsoft Fixes 6 Zero-day Flaws in December 2021 Patch Tuesday Update

Microsoft released patches for 67 CVEs in its latest December 2021 Patch Tuesday update. Out of 67 vulnerabilities, 60 were deemed important, and seven...

Around 300,000 MikroTik Devices Vulnerable to Hacker Intrusions

Threat actors often prey on vulnerable devices to break into targeted networks. With most employees working remotely, cybercriminals increased their hacking attempts targeting vulnerable...

This Device Simplifies Password Management and Protects User Credentials

With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...

71% of Indian Organizations Attribute Cyberattacks to Vulnerabilities in Technology Deployed...

Cyber Exposure company, Tenable, published a global study that revealed 71% of organizations in India attribute recent business-impacting cyberattacks on the remote workforce due...

Microsoft September 2021 Patch Tuesday: Mitigations and Workarounds

Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important,...

Millions of Bluetooth Devices Affected by BrakTooth Flaws

Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design...

“Zero-Trust Is Not a Product or Solution That Can Be Installed”

Under the prevailing circumstances of the pandemic, IT assets are no longer present behind the safe confines of corporate firewalls. Rather, they are dispersed...

Episode #11: Supply Chain Attacks and Vulnerability Disclosures

In the past year, we have seen accelerated adoption of digital platforms and technologies. For instance, more businesses and individuals are turning to e-commerce...

The Vulnerabilities that Open the Door to Ransomware

The Darkside ransomware group brought the Colonial Pipeline to its knees in May 2021. In another incident that soon followed, REvil (Ransomware Evil), a...

MOST POPULAR

RECENT POSTS