The Latest in IT Security

Posts Tagged ‘vulnerabilities’

Google says it plans to be more proactive in its bug and vulnerability hunting and is now offering money before patch work is completed, as opposed to after the fact. Security needs to be a proactive enterprise, which usually means that companies such as Google have to fund bug-hunting programs so that they know about […]

Read more ...

A VPN vulnerability that provided both initial access to a victim’s computer and privilege escalation once access was granted has been disclosed. The vulnerability in the Aviatrix VPN client, used by large organizations such as NASA and Shell, has been patched in all versions and is available for download. Immersive Labs researcher and content engineer […]

Read more ...

VNC systems use the remote frame buffer (RFB) protocol to allow users to remotely control a device. According to Kaspersky, VNC is often used in industrial environments and many manufacturers of industrial control systems (ICS) use VNC to add remote administration capabilities to their products. Kaspersky has analyzed four widely used open source VNC systems, […]

Read more ...


Categories

FRIDAY, JANUARY 24, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments