Home Tags Vulnerabilities

Tag: Vulnerabilities

Microsoft September 2021 Patch Tuesday: Mitigations and Workarounds

Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important,...

Millions of Bluetooth Devices Affected by BrakTooth Flaws

Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design...

“Zero-trust is not a product or solution that can be installed”

Under the prevailing circumstances of the pandemic, IT assets are no longer present behind the safe confines of corporate firewalls. Rather, they are dispersed...

Episode #11: Supply Chain Attacks and Vulnerability Disclosures

In the past year, we have seen accelerated adoption of digital platforms and technologies. For instance, more businesses and individuals are turning to e-commerce...

The Vulnerabilities that Open the Door to Ransomware

The Darkside ransomware group brought the Colonial Pipeline to its knees in May 2021. In another incident that soon followed, REvil (Ransomware Evil), a...

Researchers Uncover Four New Malware Tools Designed to Exploit Pulse Secure...

Unpatched security flaws always cause a potential threat to organizations. Cybercriminals often target unpatched vulnerabilities to gain access to victims’ data and networks. Recently,...

Eaton Releases Patches to Fix Severe Vulnerabilities in its Intelligent Power...

Eaton, a power management solutions provider had some severe vulnerabilities in its Intelligent power management (IPM) solution, which potentially allowed threat actors to penetrate...

Patch Now! Researchers Find Zero-Day Flaws in Google and Microsoft

The risks from cybercriminals exploiting zero-day vulnerabilities have become a continuous threat for organizations, globally. Recently, security experts from Kaspersky found a zero-day vulnerability...

Is Automated Vulnerability Remediation the Answer?

Download Your Guide Now! What is your mean time to remediate (MTTR). Unless you’re measuring it in minutes, it’s too long. Is automated remediation the...

Everything You Need to Know About Dictionary Attacks

Cybercriminals leverage several ways to illicitly obtain users’ login credentials and break into their systems. At the same time, poor password practices of users...

MOST POPULAR

RECENT POSTS