Where are we most likely to be attacked ? Whats is the most common attack vector ? How long do we have to pach API vulnerabilities...
Category: Vulnerabilities
CISA added SAP flaw to its Known Exploited Vulnerabilities Catalog
CISA added SAP flaw to its Known Exploited Vulnerabilities CatalogUS CISA added a critical SAP flaw to its Known Exploited Vulnerabilities Catalog after its details were...
Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable
Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionableThe fallout of the SolarWinds cybersecurity incident, coupled with Cybersecurity Executive Order (EO) put the topic of software...
Universal database of device vulnerability information launched
Universal database of device vulnerability information launchedA universal database of agentless devices currently being used on enterprise networks has been announced by DeviceTotal. The new repository...
Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe
Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony AnscombeZero-day vulnerabilities are super active and Google and Apple are acting...
ÆPIC and SQUIP Vulnerabilities Found in Intel and AMD Processors
ÆPIC and SQUIP Vulnerabilities Found in Intel and AMD ProcessorsA group of researchers has revealed details of a new vulnerability affecting Intel CPUs that enables attackers...
Apple Releases Security Updates to Patch Two New Zero-Day Vulnerabilities
Apple Releases Security Updates to Patch Two New Zero-Day VulnerabilitiesApple on Wednesday released security updates for iOS, iPadOS, and macOS platforms to remediate two zero-day vulnerabilities previously exploited by...
New Google Chrome Zero-Day Vulnerability Being Exploited in the Wild
New Google Chrome Zero-Day Vulnerability Being Exploited in the WildGoogle on Tuesday rolled out patches for Chrome browser for desktops to contain an actively exploited high-severity...
Penetration Testing or Vulnerability Scanning? What’s the Difference?
Penetration Testing or Vulnerability Scanning? What's the Difference?Pentesting and vulnerability scanning are often confused for the same service. The problem is, business owners often use one...
New Amazon Ring Vulnerability Could Have Exposed All Your Camera Recordings
New Amazon Ring Vulnerability Could Have Exposed All Your Camera RecordingsRetail giant Amazon patched a high-severity security issue in its Ring app for Android in May...
Universal database of device vulnerability information launched
Universal database of device vulnerability information launchedA universal database of agentless devices currently being used on enterprise networks has been announced by DeviceTotal. The new repository...
CISA Warns of Hackers Exploiting Multiple Vulnerabilities in the Zimbra Collaboration Suite
CISA Warns of Hackers Exploiting Multiple Vulnerabilities in the Zimbra Collaboration SuiteThe advisory was compiled by CISA with the Multi-State Information Sharing & Analysis CenterLeer másThe...