Home Tags Vulnerabilities

Tag: Vulnerabilities

Back to Basics: What Security Leaders Need to Do to Protect...

Cybersecurity can feel quite overwhelming and complicated for business leaders. That poses a challenge to the CISO who must communicate the impact of security breaches and...

40 Billion User Records Exposed Globally in 2021

Cybercriminals often exploit leaked/stolen sensitive user information to perform various cyberattacks, including phishing and identity theft. The rising information leaks on dark web forums...

6 Things CISOs Must Do to Mitigate Risks from Log4j

Log4j has been tagged by security vendor Tenable as the "single biggest, most critical vulnerability of the last decade." MITRE rated the vulnerability as...

Microsoft Fixes 6 Zero-day Flaws in December 2021 Patch Tuesday Update

Microsoft released patches for 67 CVEs in its latest December 2021 Patch Tuesday update. Out of 67 vulnerabilities, 60 were deemed important, and seven...

Around 300,000 MikroTik Devices Vulnerable to Hacker Intrusions

Threat actors often prey on vulnerable devices to break into targeted networks. With most employees working remotely, cybercriminals increased their hacking attempts targeting vulnerable...

This Device Simplifies Password Management and Protects User Credentials

With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...

71% of Indian Organizations Attribute Cyberattacks to Vulnerabilities in Technology Deployed...

Cyber Exposure company, Tenable, published a global study that revealed 71% of organizations in India attribute recent business-impacting cyberattacks on the remote workforce due...

Microsoft September 2021 Patch Tuesday: Mitigations and Workarounds

Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important,...

Millions of Bluetooth Devices Affected by BrakTooth Flaws

Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design...

“Zero-Trust Is Not a Product or Solution That Can Be Installed”

Under the prevailing circumstances of the pandemic, IT assets are no longer present behind the safe confines of corporate firewalls. Rather, they are dispersed...

MOST POPULAR

RECENT POSTS