Displaying items by tag: Vulnerabilities

GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises worldwide, exploring the obstacles and threats organisations face when protecting AD and how they adapt to address these growing concerns.

Published in Guest Research

COMPANY NEWS Claroty, a leader in industrial cybersecurity, launches Team82, its new research arm dedicated to threat research reports, policies, and disclosures. It recently published a report that details vulnerabilities in cloud-based management platforms and the need to secure implementations.

Published in Security
Thursday, 17 June 2021 16:09

Jamf bolsters security capabilities

Apple enterprise management specialist Jamf has announced a series of new security capabilities.

Published in Security

Just days after the arrival of major updates for Apple's operating systems, the company has released a fresh round of security updates for macOS, iOS, iPadOS and watchOS.

Published in Security

Microsoft has issued patches for four remotely-exploitable vulnerabilities in its Exchange Server product, a little more than a month after the company warned of four zero-day exploits being used to attack the application.

Published in Security

A threat intelligence report from security provider Onapsis and business software vendor SAP claims that threat actors are actively exploiting unprotected mission-critical SAP applications.

Published in Security

The Microsoft-owned code repository GitHub has sought to protect the wares of its parent company from attack by taking down proof-of-concept code for exploiting two of the four Microsoft Exchange Server bugs that came to light recently.

Published in Security

The number of APT groups "exploiting the latest Exchange vulnerabilities grows, with thousands of email servers under siege" according to security company ESET.

Published in Security
Monday, 26 October 2020 23:44

Using fake data to protect against cyberattacks

GUEST OPINION by Jim Cook, Attivo Networks:  Separating truth from fiction in these days of social media campaigns and so-called fake news can often be challenging. As a result, false data that appears valuable can influence people.

Published in Guest Opinion

COVID-19 related threats are the single largest type of threat in the first half of this year, according to one security firm which says it blocked 8.8 million COVID-19 related threats, nearly 92% of which were spam delivered via emails.

Published in Security

Veteran vulnerability researcher Dave Aitel has offered his views on a major flaw in the BIG-IP range of devices, saying that the fact many people had assumed it had never been found and exploited could well be incorrect.

Published in Security

When American tech journalists see the words "vulnerability" and "Huawei" in close proximity these days, they tend to get over-excited and, as a result, produce copy that goes quite wonky.

Published in Open Sauce

The number of vulnerabilities in Microsoft products increased last year, with a total of 700 flaws found, a study by privileged identity management and vulnerability management product manufacturer Beyond Trust says, adding that 81% of these could have been kept in check by not giving users blanket administrator rights.

Published in Security

Microsoft was targeted by eight of the top ten vulnerabilities in 2018, a study by the security intelligence firm Recorded Future has found.

Published in Security

A recent report from the US Government Accountability Office paints a very bleak picture of the cyber security of modern US weapons systems.

Published in Security

Two vulnerabilities in Facebook's "view as" feature — a feature that lets people see what their own profile looks like to someone else — were exploited by attackers who gained access to the personal information of about 50 million users, among them those of chief executive Mark Zuckerberg and chief operating officer Sheryl Sandberg, the company said on Friday.

Published in Security

Fax machines, which are part of many all-in-one printers, can be compromised over the telephone line and used to attack Windows PCs on the networks to which they are attached, researchers from from security firm Check Point say.

Published in Security

A vulnerability study by security outfit Tenable Research appears to discredit its own work by stating that the sample size it used for the study was not representative.

Published in Security

Cisco has released a flurry of advisories advising of vulnerabilities in its products, with a total of 18 released over the days from 15 May to 17 May.

Published in Security

Vulnerabilities in Adobe's Flash Player took second place to flaws in Microsoft products last year in a list of the most used avenues of attack by cyber criminals compiled by security firm Recorded Future.

Published in Security

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments