New vulnerability research by Outpost24 has revealed interesting data trends in vulnerability management across different regions and sectors. When analysed,…
Browsing: Malware and Vulnerabilities
It has been reported that Microsoft leaked info on a security update for a ‘wormable’ pre-auth remote code execution vulnerability found in the…
Cybereason’s Nocturnus Research Team is investigating a campaign where cybercriminals are trojanising multiple hacking tools with njRat, a well known…
It has been reported that COVID-19 is causing a digital threat. Forbes claims that coronavirus is a good opportunity for companies to test…
It has been reported that a huge proportion of internet-connected imaging devices at hospitals run outdated operating systems, according to…
It has been reported that through the use of an automated testing toolkit, a team of South Korean academics has discovered 30…
In response to reports that indicate more than half of attacks last year leveraged fileless or “malware-free” techniques, as hackers…
Mass scanning activity of Apache Tomcat servers that have not been patched from the Ghostcat vulnerability has been detected.
Vulnerability management (VM) can seem unmanageable at times. But the key to successful VM is working smarter rather than harder.…
According to an annual report on the state of ethical hacking published by HackerOne, the money earned in bounties this year was…