Advertisement
Home Tags Vulnerabilities

Tag: vulnerabilities

Simplifying Enterprise Data Protection: Commvault and Lenovo Tackle Cyber Threats in the Hybrid Cloud Era

Fortinet threat research finds cybercriminals are exploiting new industry vulnerabilities 43% faster than 1H...

Fortinet announced the release of the FortiGuard Labs 2H 2023 Global Threat Landscape Report. The latest semi-annual report is a snapshot of the active threat...

Cybersecurity Predictions for 2023: Norton Labs

Norton, a consumer Cyber Safety brand of Gen released its top cyber trends to watch in 2023, emphasizing that the economy will have the...

Forescout: 56 vulnerabilities found in OT, Icefall report

Forescout’s Vedere Labs, in collaboration with CISA’s vulnerability disclosure process, is disclosing OT:ICEFALL, 56 vulnerabilities affecting devices from 10 OT (operational technology) vendors....

5 essential ways to improve SDLC Security

Written By: Dotan Nahum Vulnerabilities found in application platforms and third-party libraries have drawn growing attention to application security in the last few years, putting...

Steady stream of attempts to exploit VMware vulnerabilities: Barracuda Research

Barracuda Networks, Inc., a leading provider of cloud-first security solutions, recently found a steady stream of attempts to exploit two recently uncovered VMware vulnerabilities...

Barracuda research: Attacks targeting Log4j vulnerabilities remain steady 

Given the popularity of the Log4J software- a Java-based logging audit framework within Apache, researchers at Barracuda, a trusted partner and leading provider of...

Check Point Research reports vulnerabilities in certain Amazon Alexa subdomains

Check Point Research has recently identified security vulnerabilities in certain Amazon/Alexa subdomains that would have allowed a hacker to remove/install skills on the targeted...

Misconfigurations accounted for over 85% of exposed records, IBM Security report

IBM Security has released the IBM X-Force Threat Intelligence Index 2020, highlighting how cybercriminals’ techniques have evolved after decades of access to tens of...