Vulnerabilities
Vulnerabilities | News, how-tos, features, reviews, and videos
8 top open source intelligence tools
OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.
Windows code-signing attacks explained (and how to defend against them)
Learn how code-signing attacks work and how to defend against them. It starts with patching.
4 top vulnerabilities ransomware attackers exploited in 2020
As more employees work from home, attackers have more endpoints to target. These unpatched vulnerabilities in remote access tools and Windows makes their job easier.
18 (new) ways attackers can compromise email
Researchers have discovered eighteen new vulnerabilities in how email systems authenticate senders, making it even easier for criminals to fool users.
Linux GRUB2 bootloader flaw breaks Secure Boot on most computers and servers
The vulnerability can also affect Windows systems. A patch is available, but will require manual testing and deployment.
11 top DEF CON and Black Hat talks of all time
Hacker summer camp is almost upon us again. Here are some of the best talks of all time. Will this year's virtual talks measure up to these legends?
Wormable DNS flaw endangers all Windows servers
The SIGRed vulnerability can spread malware across a network without user interaction. Microsoft has issued an urgent patch.
Critical flaw allows hackers to breach SAP systems with ease
SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.
Privilege escalation explained: Why these flaws are so valuable to hackers
Attackers use privilege escalation flaws to gain access to systems and applications. Patching and monitoring are the most important ways to stop them.
Vulnerable drivers can enable crippling attacks against ATMs and POS systems
Newly discovered vulnerabilities could allow more persistent and destructive attacks on popular models of ATM and POS devices.
Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries
The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.
Install latest SAP Adaptive Server Enterprise patches, experts urge
If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.
Skipped patch from 2012 makes old Microsoft Office systems a favored target
Some organizations have still not implemented an Office patch from 2012. Attackers know this and are exploiting the vulnerability.
PrintDemon vulnerability explained: Its risks and how to mitigate
Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.
Executive order boots “foreign adversaries” from US electric grid over security concerns
White House action implies that China is "creating and exploiting" vulnerabilities in the US power grid. Experts say hardware backdoors have the potential for doing significant damage.
Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass
The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now.
4 critical issues surrounding contact-tracing apps
As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.
Attacks against internet-exposed RDP servers surging during COVID-19 pandemic
Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.
Cloud servers hacked via critical SaltStack vulnerabilities
Attackers were quick to exploit recently announced vulnerabilities to deploy cryptominers. Patch Salt now.
7 ways to make your Zoom meetings safer
Learn to use the tools Zoom gives you to secure online conferences.
-
Video/Webcast
Sponsored -
Analyst Report
Sponsored -
White Paper
-
Analyst Report
Sponsored -
eBook
Sponsored