Tag: Vulnerability
-
The Fundamentals of Cloud Security Stress Testing
״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset …
-
Vulnerability exploitation on the rise
Popular threat actors utilize a variety of vulnerabilities to access companies’ sensitive information. Visa analyzed payment-related …
-
RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds
Three years after its discovery, the Log4J vulnerability (CVE-2021-44228) exploit remains one of the most used exploits observed by cloud …
-
#RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds
Three years after its discovery, the Log4J vulnerability (CVE-2021-44228) exploit remains one of the most used exploits observed by cloud …
-
Critical GitLab account takeover flaw added to CISA’s KEV Catalog
A critical GitLab vulnerability that could enable account takeover was added to the Cybersecurity & Infrastructure Security Agency’s …
-
When is One Vulnerability Scanner Not Enough?
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give …
-
DBIR: Vulnerability Exploits Triple as Initial Access Point for Data Breaches
The exploitation of vulnerabilities as an initial access step for a breach increased by a staggering 180% between 2022 and 2023. According …
-
1,200+ Vulnerabilities Detected In Microsoft Products In 2023
Hackers often focus on flaws in Microsoft products since they are commonly employed in various institutions and personal computers, which …
-
7-Year-Old 0-Day in Microsoft Office Exploited to Drop Cobalt Strike
Cybersecurity firm Deep Instinct has discovered that attackers are using the Cobalt Strike loader to deploy old zero-day exploits, a …
-
BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023
The number of Microsoft vulnerabilities has mostly flattened in 2023, with elevation of privilege and identity attacks being particularly …
-
Ensuring the Security and Efficiency of Web Applications and Systems
As the number of applications and systems used in businesses grows, so do the threats and vulnerabilities that can lead to unauthorized …
-
NDR in the Modern Cybersecurity Landscape
In today’s information age, businesses are increasingly reliant on interconnected networks and cloud infrastructures, and protecting …
●●●