In the people-process-technology triad, human error is the top reason for breaches, accounting for 70% of successful attacks, a Cyberinc survey reveals. The next biggest cause is vulnerability management through patches and upgrades, accounting for jus…Read More People are the weakest link in data breaches, but can they be held accountable?
According to our Cybersecurity Glossary, a vulnerability can be defined as follows: A vulnerability is a hole in computer security, that leaves the system open to damages caused by cyber attackers. Vulnerabilities have to solved as soon as they are dis…Read More What Is a Vulnerability Management Program and Why You Need It
Craig Young, Principal Security Researcher at Tripwire, unpacks the modern security researcher’s toolkit to reverse engineer complex designs. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/…Read More Reverse Engineering: A Security Researcher’s Toolkit
F5 Networks is a leading provider of enterprise networking gear, with software and hardware customers like governments, Fortune 500 firms, banks, internet service providers, and largely known consumer brands (Microsoft, Oracle, and Facebook). The patc…Read More F5 Announces Critical BIG-IP pre-auth RCE bug
Four business applications used by state government entities have been found to contain control weaknesses related mostly to poor information security policies and procedures. During her latest audit, the WA auditor-general Caroline Spencer tested the …Read More Four IT Applications in Western Australia Are Having Control Weaknesses
Microsoft got an early start on Patch Tuesday, releasing a series of out-of-band security updates this week to address four zero-day vulnerabilities in Exchange Server. There’s been a lot of security activity in the news, so I’m sure it is going to be …Read More March 2021 Patch Tuesday forecast: Off to an early start
CompuCom is an IT managed services provider (MSP) that gives remote support, hardware and software repair but also other technology services to companies, employing approximately 8,000 people. Some of the past and existing customers of CompuCom include…Read More The US Managed Service Provider CompuCom Confirms Ongoing Outage Following Malware Incident
When discussing cyber risks, among the most common terms that are used are vulnerabilities, exploits, and threats. It is necessary to understand the difference between these terms and what they mean in order to properly define Vulnerability Risk Manage…Read More What Is Vulnerability Risk Management?
NIST logged more than 18,000 vulnerabilities in 2020, over 10,000 of which were critical or high severity – an all-time high. Redscan’s analysis looks beyond severity scores, detailing the rise of low complexity vulnerabilities as well as those which r…Read More 57% of vulnerabilities in 2020 were classified as critical or high severity
Linux and Unix operating systems require regular patching like any IT system, but as security professionals, ethical hackers, and criminal hackers will tell you, regular Linux and Unix patching is often neglected.CVE-2021-3156 sudo VulnerabilityLast we…Read More The Linux Flaw you can’t afford to Ignore (CVE-2021-3156)
Security researchers at Google have claimed that a quarter of all zero-day software exploits could have been avoided if more effort had been made by vendors when creating patches for vulnerabilities in their software. In a blog post, Maddie Stone of Go…Read More Sloppy patches are a breeding ground for zero-day exploits, says Google
Article by Nathan King, Director, CyberisVulnerability scoring has an important role in most enterprise threat and vulnerability management programmes because it provides multiple benefits to internal security teams when identifying any weaknesses. Add…Read More The Dangers of Security Vulnerability Scoring Dependency