vulnerabilities
-
Microsoft Urges Customers to Secure On-Premises Exchange Servers
Email Security / Cyber Threat Microsoft is urging customers to keep their Exchange servers updated as well as take steps…
Read More » -
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
Server Security / DNS The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley…
Read More » -
Is Once-Yearly Pen Testing Enough for Your Organization?
Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen testing. Even a…
Read More » -
The Definitive Browser Security Checklist
Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a…
Read More » -
VMware Releases Patches for Critical vRealize Log Insight Software Vulnerabilities
Software Security / VMware VMware on Tuesday released software to remediate four security vulnerabilities affecting vRealize Log Insight (aka Aria…
Read More » -
Security Navigator Research: Some Vulnerabilities Date Back to the Last Millennium
Vulnerability analysis results in Orange Cyberdefenses’ Security Navigator show that some vulnerabilities first discovered in 1999 are still found in…
Read More » -
Apple Issues Updates for Older Devices to Fix Actively Exploited Vulnerability
Mobile Security / 0-Day Attack Apple has backported fixes for a recently disclosed critical security flaw affecting older devices, citing…
Read More » -
Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud
Mobile Hacking / App Security Two security flaws have been disclosed in Samsung’s Galaxy Store app for Android that could…
Read More » -
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
Firewall / Network Security A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a…
Read More » -
6 Types of Risk Assessment Methodologies + How to Choose
An organization’s sensitive information is under constant threat. Identifying those security risks is critical to protecting that information. But some…
Read More »