Understand your security vulnerabilitiesArticle by Beau PetersThe basic approaches like phishing simulations are good, but they tend to have limited reach. This is why more agile methods, penetration testing among them, have been getting incr…Read More How Businesses Can Utilise Penetration Testing
Your mobile device can be hacked very easily without your knowledge. Even if an attacker can’t get into your device they can attempt to gain access to the sensitive information instead that is stored inside such as your places visited, emails and conta…Read More How Hidden Vulnerabilities will Lead to Mobile Device Compromises
More than 328 control weaknesses were highlighted by the Auditor-General of Western Australia on Wednesday in a report that analyzed the computer systems used at 50 local government entities. Auditor General Caroline Spencer decided against disclosing …Read More 50 Local Australian Government Systems Found to Have Significant Digital Weaknesses
Today’s VERT Alert addresses Microsoft’s May 2021 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-943 on Wednesday, May 12th. In-The-Wild & Disclosed CVEs CVE-2021-31204 Up first in the list…Read More VERT Threat Alert: May 2021 Patch Tuesday Analysis
Several years ago, risk-based cybersecurity was a largely untested and hotly debated topic. But the tests have since been administered and the debate largely settled: risk-based cybersecurity produces proven results. The data shows that risk-based vuln…Read More Risk-based vulnerability management has produced demonstrable results
Las organizaciones se enfrentan a un panorama de amenazas en constante evolución, esa es una de las circunstancias que hacen es imperativo que las organizaciones mantengan una política de gestión de vulnerabilidades actualizada para corregir y controla…Read More 4 cosas que debe incluir una política de gestión de vulnerabilidades
Which Is Better? A Vulnerability Scan Or A Penetration Test?Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused about the same service, which leads …Read More Which is more Important: Vulnerability Scans Or Penetration Tests?
When discussing cyber risks, among the most common terms that are used are vulnerabilities, exploits, and threats. It is necessary to understand the difference between these terms and what they mean in order to properly define Vulnerability Risk Manage…Read More What Is Vulnerability Risk Management?
NIST logged more than 18,000 vulnerabilities in 2020, over 10,000 of which were critical or high severity – an all-time high. Redscan’s analysis looks beyond severity scores, detailing the rise of low complexity vulnerabilities as well as those which r…Read More 57% of vulnerabilities in 2020 were classified as critical or high severity
Linux and Unix operating systems require regular patching like any IT system, but as security professionals, ethical hackers, and criminal hackers will tell you, regular Linux and Unix patching is often neglected.CVE-2021-3156 sudo VulnerabilityLast we…Read More The Linux Flaw you can’t afford to Ignore (CVE-2021-3156)
Security researchers at Google have claimed that a quarter of all zero-day software exploits could have been avoided if more effort had been made by vendors when creating patches for vulnerabilities in their software. In a blog post, Maddie Stone of Go…Read More Sloppy patches are a breeding ground for zero-day exploits, says Google
Article by Nathan King, Director, CyberisVulnerability scoring has an important role in most enterprise threat and vulnerability management programmes because it provides multiple benefits to internal security teams when identifying any weaknesses. Add…Read More The Dangers of Security Vulnerability Scoring Dependency