Vulnerabilities | News, how-tos, features, reviews, and videos
The rapid of exploitation of zero-day vulnerabilities, such as MOVEit, and the effectiveness of ransomware attacks are two of the major findings from last year’s breach data.
Some vulnerabilities eat up a security team’s time and resources yet provide little or nothing in the way of true protection. Some may even introduce more risk to a network.
In the written testimony before the House Energy and Commerce Committee, CEO Andrew Witty said after gaining access, the threat actor moved laterally within the systems using sophisticated methods and exfiltrated data.
Attackers target flaws for a reason: Even years after they are discovered, they still work.
Hackers exploited previously undetected vulnerabilities in Cisco’s Adaptive Security Appliances — a product that combines multiple cybersecurity functions.
The Chinese APT group is using a variety of tools to infiltrate networks and steal large amounts of data.
What should happen in the wake of the CSRB’s Microsoft report? This former security industry analyst has some suggestions.
The vulnerability found in GlobalProtect could be exploited to gain access to corporate networks and has seen a rise in compromise attempts despite being patched.
MagicDot technique allows attackers to capitalize on an already-patched vulnerability simply by changing the dots in a path.
Cisco fixes high-risk flaws in the out-of-band management controller of multiple products