The Latest in IT Security

Posts Tagged ‘Exploit’

In late 2020, the World Economic Forum stated that “the approach to cybersecurity needs to be overhauled before the industry finds itself in any fit state to tackle the threat.” The WEF singled out five global cybersecurity challenges: 1. Increasing sophistication of cyberattacks and cyber adversaries 2. Widening cybersecurity skills gap 3. Lack of intelligence […]

Read more ...

CVE-2020-1472, a privilege elevation vulnerability in the Netlogon Remote Protocol (MS-NRPC) for which Microsoft released a patch in August, has just become a huge liability for organizations that are struggling with timely patching. Secura researchers – the very same ones who found and disclosed the flaw to Microsoft – have published additional technical details on […]

Read more ...

New research from Veracode found that most applications use open-source libraries that also present vulnerabilities, but the distribution of such libraries depends on the programming languages used. Open-source libraries are ubiquitous, but they are not limited to integration into open-source apps. In fact, most available apps contain open source libraries, even if they are from […]

Read more ...


Categories

TUESDAY, AUGUST 03, 2021
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments