Tag: Weak
-
Half of IT Leaders Identify IoT as Security Weak Point
Half of all IT leaders believe that the Internet of Things (IoT) is the weakest part of their security efforts, according to findings from …
-
Most Popular Websites Still Allow Users To Have Weak Passwords
The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most popular websites in the …
-
Weak session keys let snoops take a byte out of your Bluetooth traffic
Multiple Bluetooth chips from major vendors such as Qualcomm, Broadcom, Intel, and Apple are vulnerable to a pair of security flaws that …
-
Weak passwords prevalent in admin portals
More than 40,000 of over 1.8 million administrator credentials compromised by information-stealing malware that have been recovered from …
-
Weak credentials, unpatched vulnerabilities, malicious OSS packages causing cloud security risks
Threat actors are getting more adept at exploiting common, everyday issues in the cloud, including misconfigurations, weak credentials, …
-
The Dangerous Weak Link in the US Food Chain
Without an information sharing and analysis center, the country’s food and agriculture sector is uniquely vulnerable to …
-
Black Hat Flashback: The Deadly Consequences of Weak Medical Device Security
It was a huge wake-up call for the cybersecurity community: Weak security could have deadly …
-
Weak data protection helped China attack US Federal Reserve, report says
China’s cyber espionage activities are extensive and sophisticated but when the Middle Kingdom tried to steal sensitive economic data from …
-
The New Weak Link in SaaS Security: Devices
By looking at the device posture while conducting a SaaS security assessment, organizations can achieve a holistic zero trust approach. …
-
AA22-137A: Weak Security Controls and Practices Routinely Exploited for Initial Access
Applying the following practices can help organizations strengthen their network defenses against common exploited weak security controls …
-
The top 5 things the 2022 Weak Password Report means for IT security
Given that passwords have had such unprecedented longevity, it would seem that password security best practices would be refined to the …
-
50% of Servers Have Weak Security Long After Patches Are Released
Many servers remain vulnerable to high-severity flaws in Microsoft Exchange Server, VMware vCenter, Oracle WebLogic, and other popular …
●●●