Popular TP-Link wireless home router open to remote hijacking
By concatenating a known improper authentication flaw with a newly discovered CSRF vulnerability, remote unauthenticated attackers can obtain full control over TP-Link …
Advantech WebAccess RCE flaw still exploitable, exploit code available
A vulnerability in Advantech WebAccess, a web browser-based software package for human-machine interfaces (HMI) and supervisory control and data acquisition (SCADA) systems, …
There’s a global divide in how organizations assess cyber risk
Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and …
Quantifying cyber exposure: Attackers are racing ahead
Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …
New infosec products of the week: February 3, 2017
New approach to continuous Docker container security NeuVector’s solution for container security is itself a container. The application automatically learns and whitelists …
Featured news
Sponsored
Don't miss
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element
- Securing your organization’s supply chain: Reducing the risks of third parties
- Understanding emerging AI and data privacy regulations
- reNgine: Open-source automated reconnaissance framework for web applications
- Women rising in cybersecurity roles, but roadblocks remain