Top

Category: Vulnerabilities


Vulnerabilities

Prioritizing Flaws Based on Severity Increasingly Ineffective: Study

November 9, 2018

Via: Security Week

The large number of vulnerabilities found every year has made it increasingly difficult for organizations to effectively prioritize the security holes exposing their applications and networks, according to a new report published on Wednesday by Tenable. The company, which helps […]


Network security, Vulnerabilities

Why You Should Start Leveraging Network Flow Data Before the Next Big Breach

November 9, 2018

Via: Security Intelligence

Organizations tend to end up in cybersecurity news because they failed to detect and/or contain a breach. Breaches are inevitable, but whether or not an organization ends up in the news depends on how quickly and effectively it can detect […]


Vulnerabilities

DJI plugs security flaws that could have enabled access to users’ data and drone images

November 8, 2018

Via: Help Net Security

Researchers at Check Point and DJI today shared details of a potential vulnerability that could have impacted DJI’s infrastructure. Vulnerability impact If exploited, the vulnerability would have given an attacker full access to a user’s account and the information within […]


Privacy protection, Vulnerabilities

Apple Modernizes Its Hardware Security with T2

November 8, 2018

Via: Threat Post

Apple has widened the range of Macs running its T2 security chip. Is macOS finally catching up with other platforms when it comes to secure computing? When Apple launched its latest MacBook Air last month, one of its more unusual […]


Vulnerabilities

How to Reduce Hidden Endpoint Management Costs and Increase Efficiency

November 7, 2018

Via: Security Intelligence

We all want faster, better endpoint management solutions at a reduced cost — but how? In part one of this series, we broke down the SANS Institute report, “Understanding the (True) Costs of Endpoint Management,” and identified the top five […]


Vulnerabilities

IBM Watson will be used by NIST to assign CVSS scores to vulnerabilities

November 6, 2018

Via: Security Affairs

The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores to reported vulnerabilities. The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information security vulnerabilities and exposures. […]


Vulnerabilities

Hackers actively exploiting vulnerabilities in Cisco security appliances

November 5, 2018

Via: Hot for Security

Networking giant Cisco is warning customers that attackers are actively exploiting a vulnerability in the company’s Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. CVE-2018-15454 describes a vulnerability in the Session Initiation Protocol (SIP) inspection engine of ASA […]


Network security, Vulnerabilities

Flaw in Icecast streaming media server allows to take off online Radio Stations

November 5, 2018

Via: Security Affairs

Icecast streaming media server is affected by a flaw that could be exploited by an attacker to take off the broadcast of online radio stations. Icecast streaming media server is affected by a vulnerability, tracked as CVE-2018-18820, that could be […]


Mobile security, Vulnerabilities

Apple Fixes Multiple macOS, iOS Bugs Including a Quirky FaceTime Vulnerability

November 1, 2018

Via: Threat Post

Apple tackled a bevy of vulnerabilities across all its platforms Tuesday, including one that allowed a remote attacker to initiate a FaceTime call by exploiting a bug in some model iPhones, iPads, and iPad Air devices. The wide-ranging security fixes […]


Network security, Vulnerabilities

Lack of awareness leaves consumers vulnerable to cyberattacks, study finds

October 24, 2018

Via: Hot for Security

An impressive number of American consumers are concerned about cybercrime and, particularly, the risks smart devices pose to the integrity of their homes. Yet they are still in the dark about how to improve security and reduce risks, a study […]