The Latest in IT Security

Posts Tagged ‘vulnerabilities’

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is offering guidance for advancing the vulnerability management ecosystem. In a November 10th blog post, Eric Goldstein, CISA Executive Assistant Director for Cybersecurity, outlines a three-step approach that organizations of any size can take to continue to make progress in efforts to thwart adversaries. They are: 1. […]

Read more ...

The most severe of the security defects is CVE-2022-20927, a bug in the dynamic access policies (DAP) functionality of ASA and FTD software, allowing a remote, unauthenticated attacker to cause a denial-of-service (DoS) condition. Due to improper processing of data received from the Posture (HostScan) module, an attacker could send crafted HostScan data to cause […]

Read more ...

Written in the C programming language and originally developed for the Gnome project, libxml2 is a software library for parsing XML documents. Tracked as CVE-2022-40303 and CVE-2022-40304, the two vulnerabilities could lead to remote code execution. Apple has credited Google Project Zero security researchers for both issues. “A remote user may be able to cause […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments