Roger Grimes on Prioritizing Cybersecurity Advice

This is a good point: Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists of new projects…lists ...
Floppy disk with a windows 95 driver.

Legacy Systems: Learning From Past Mistakes

Legacy systems are attractive targets to bad actors because outdated components often mean that security vulnerabilities remain unpatched, offering exploitable footholds. “End of life” does not mean “end of vulnerability.” ...
Security Boulevard

The Impact of Live Patching on OpenSSL Security and Best Practices

Live patching allows for updating OpenSSL without system reboots – reducing downtime and maintaining service availability. While live patching improves security by enabling faster updates, careful planning and implementation are crucial. Best ...
vulnerabilities, Cato, patch, automation, patch management, Action1 patching cyberattacks JumpCloud patching

Action1 Extends Automated Patching Capability to Groups of Endpoints

Action1 updated its patch management platform to make it possible to dynamically group endpoints and provide an audit trail capability ...
Security Boulevard

Securing Networks: Addressing pfSense Vulnerabilities

In recent findings by Sonar, critical security vulnerabilities have emerged within the widely-used open-source Netgate pfSense firewall solution, potentially exposing susceptible appliances to unauthorized command execution. These pfSense vulnerabilities, comprising two reflected ...

CACTUS Qlik Ransomware: Vulnerabilities Exploited

A cyberattack campaign dubbed the CACTUS Qlik Ransomware has become prominent in ransomware attacks on BI systems. Researchers have warned of threat actors exploiting three Qlik security vulnerabilities to target different organizations ...

Supermicro IPMI Firmware Vulnerabilities Disclosed

A number of security flaws have recently been discovered in Supermicro’s baseboard management controllers (BMCs). These Supermicro IPMI firmware vulnerabilities in the Intelligent Platform Management Interface (IPMI) pose serious dangers, including privilege ...
Learn about the StackRot vulnerability

What You Need to Know About StackRot – CVE-2023-3269

StackRot, identified as CVE-2023-3269 is a 7.8 HIGH use-after-free vulnerability in the Linux kernel versions 6.1 to 6.4 that can lead to privilege escalation. The vulnerability, which was disclosed by Ruihan Li ...
Zyxel Firewall Protection: Patching to Combat Attacks

Zyxel Firewall Protection: Patching to Combat Attacks

Introduction Zyxel firewall helps to secure networks against threats and unauthorized access. In today’s world where we share a tremendous amount of data online, network security has become vital. It’s necessary for ...
SASE, market, vendors, data, security, confidence, SASE, network penetration F5

NetOps, Security Pros Overwhelmed by Network Updates 

Network operations and security professionals are overwhelmed by constant updates and need more support from leadership to keep network and security devices updated and backed up. These were among the key results ...
Security Boulevard