myths-of-vulnerability-management

Vulnerability management has been a standard practice for more than 15 years now. Scanning, assessment, and remediation have occupied an important spot in an organization’s endpoint security practices. However, many old beliefs and approaches that were once working fine have turned out ineffective and outright wrong. Unknowingly sticking to outdated practices may give you a […]

Read More →
google-chrome-zero-day-vulnerability-october-2020

We all know the popularity and intensively large audience of the Google Chrome browser which can be used on Windows, Mac, or Linux computers and Android devices. To the ones who are currently using the same and have not yet deployed the patch, it’s time to update their Chrome browsers to the latest version 86.0.4240.111 […]

Read More →
visibility-and-control

Business demands are driving a surge of enterprise endpoints. The average IT asset inventory is constantly growing with remote and heterogeneous devices used by multiple employees. While businesses take longer strides and step into bigger opportunities, it is essential to secure all the endpoints that keep the business running. According to a study, 30 percent […]

Read More →
oracle-october-security-updates

Oracle has released 402 new security patches as a part of the quarterly update cycle. 270 vulnerabilities are remotely exploitable without user credentials. Oracle MySQL received 53 security patches. 4 of these vulnerabilities allow an attacker to exploit the underlying flaws over the network without any form of authentication. CVE-2020-8174 is considered to be the most critical of […]

Read More →
patch-management-best-practices-2020

Software patching is one of the primary security measures to prevent cyber-attacks. Many organizations realize the importance of patching, but the challenge starts when carrying-out patching as a routine activity. With multiple operating systems and software, ever-expanding networks, and an improper strategy, many organizations struggle to patch their software at the earliest and secure their […]

Read More →
october-patch-tuesday

Microsoft has released October Patch Tuesday security updates, addressing a total of 87 vulnerabilities in the family of Windows operating systems and related products. In which, 11 are classified as Critical that can be used by the attackers to get complete control over an unpatched victim system. All of the critical bugs are remote code […]

Read More →

The year is almost coming to an end. We’ve been practicing good personal hygiene at home, offices, and everywhere else to protect our loved ones. While we’ve been confined to our homes, crossing our fingers, and hoping the pandemic comes to an end, the dark underbelly of cyberspace has quietly grown its reaches far wide.  […]

Read More →
AgeLocker Ransomware Targeting QNAP NAS Devices

AgeLocker Ransomware targeting QNAP network-attached storage (NAS) devices have been used by attackers to encrypt user data and demand a ransom. It has been found after research that no unpatched vulnerability was found to be exploited in the use of AgeLocker ransomware attack, whereas all the known affected QNAP NAS Devices are running older unpatched […]

Read More →
Zerologon Vulnerability in Windows Netlogon Remote Protocol

A critical and interesting vulnerability in the Netlogon Remote Protocol of the Windows server was patched by Microsoft team last month. This flaw discovered by the Cybersecurity firm Secura (dubbed as Zerologon), has received the highest severity score of 10.0. The vulnerability is identified as CVE-2020-1472 and allows an attacker to successfully compromise the vulnerable […]

Read More →
Microsoft Security Bulletin Summary for September 2020

Microsoft has released September Patch Tuesday security updates with a total release of 129 vulnerabilities, In which 23 are classified as Critical with Remote Code Execution(RCE) 105 are classified as important and 1 is classified as moderate that reside in the Microsoft Windows, Microsoft Exchange Server, Internet Explorer (IE), Microsoft Edge (EdgeHTML-based and Chromium-based in […]

Read More →