Skip to content
SecPod Blog
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • SanerNow CyberHygiene Platform
    • Platform Overview
    • Vulnerability Management
    • Patch Management
    • Compliance Management
    • Asset Management
    • Endpoint Management
    • Threat Detection and Response
    • Documentation
    • Schedule Demo
  • About
    • Company
    • SecPod Culture
      • CEO Speak
  • Contact
    • Contact Us
    • Schedule a SanerNow Demo
Search this website
Menu Close
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • SanerNow CyberHygiene Platform
    • Platform Overview
    • Vulnerability Management
    • Patch Management
    • Compliance Management
    • Asset Management
    • Endpoint Management
    • Threat Detection and Response
    • Documentation
    • Schedule Demo
  • About
    • Company
    • SecPod Culture
      • CEO Speak
  • Contact
    • Contact Us
    • Schedule a SanerNow Demo
Read more about the article High-Severity Remote Code Execution Vulnerability in Google Chrome

High-Severity Remote Code Execution Vulnerability in Google Chrome

  • Post author:Jithendra R
  • Post published:August 26, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:2 mins read

A high-severity 'use-after-free vulnerability tracked as CVE-2020-6492 with a CVSSv3 base score of 8.3 exists in WebGL [Web Graphics Library]…

Continue ReadingHigh-Severity Remote Code Execution Vulnerability in Google Chrome
Read more about the article Patch Tuesday: Microsoft Security Bulletin Summary for August 2020

Patch Tuesday: Microsoft Security Bulletin Summary for August 2020

  • Post author:Jithendra R
  • Post published:August 12, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:6 mins read

Microsoft Security Bulletin August 2020 was released, addressing a total number of 120 vulnerabilities, including two Zero-days in the family of…

Continue ReadingPatch Tuesday: Microsoft Security Bulletin Summary for August 2020
Read more about the article High-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password

High-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password

  • Post author:Jithendra R
  • Post published:August 7, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:3 mins read

A high-risk vulnerability was found in TeamViewer for Windows. It is tracked as "CVE-2020-13699", with a CVSS base score of…

Continue ReadingHigh-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password
Read more about the article Patch Tuesday: Microsoft Security Bulletin Summary for July 2020

Patch Tuesday: Microsoft Security Bulletin Summary for July 2020

  • Post author:Jithendra R
  • Post published:July 15, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:6 mins read

Microsoft Patch Tuesday July 2020 has released July Patch Tuesday security updates, addressing a massive number of 123 vulnerabilities and…

Continue ReadingPatch Tuesday: Microsoft Security Bulletin Summary for July 2020
Read more about the article Critical Vulnerabilities in Palo Alto Networks PAN-OS devices

Critical Vulnerabilities in Palo Alto Networks PAN-OS devices

  • Post author:Jithendra R
  • Post published:July 10, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:3 mins read

Palo Alto Network (PAN) has recently fixed a critical vulnerability, related to the PAN-OS operating systems. The operating systems are…

Continue ReadingCritical Vulnerabilities in Palo Alto Networks PAN-OS devices
Read more about the article Apache Guacamole Critical Vulnerabilities Put Remote Desktops at Risk

Apache Guacamole Critical Vulnerabilities Put Remote Desktops at Risk

  • Post author:Jithendra R
  • Post published:July 3, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:4 mins read

Security researchers at Check Point have uncovered multiple critical reverse RDP vulnerabilities in the Apache Guacamole. Apache Guacamole is a…

Continue ReadingApache Guacamole Critical Vulnerabilities Put Remote Desktops at Risk
Read more about the article ‘Ripple20’ Vulnerabilities Affecting Millions of Internet Connected Devices Worldwide

‘Ripple20’ Vulnerabilities Affecting Millions of Internet Connected Devices Worldwide

  • Post author:Jithendra R
  • Post published:June 18, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:5 mins read

Treck TCP/IP is a high-performance TCP/IP protocol suite designed for embedded systems. A set of 19 critical and high-severity security…

Continue Reading‘Ripple20’ Vulnerabilities Affecting Millions of Internet Connected Devices Worldwide
Read more about the article A Critical Vulnerability ‘SMBleed’ Impacts Windows SMB Protocol

A Critical Vulnerability ‘SMBleed’ Impacts Windows SMB Protocol

  • Post author:Jithendra R
  • Post published:June 11, 2020
  • Post category:Category(Default) - Do Not Use This/Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:3 mins read

The Server Message Block Protocol (SMB protocol) which runs over TCP port 445 is a client-server communication protocol used for…

Continue ReadingA Critical Vulnerability ‘SMBleed’ Impacts Windows SMB Protocol
Read more about the article Critical Vulnerabilities in SAP Adaptive Server Enterprise (ASE)

Critical Vulnerabilities in SAP Adaptive Server Enterprise (ASE)

  • Post author:Jithendra R
  • Post published:June 4, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:5 mins read

The SAP Adaptive Server Enterprise (ASE), previously known as Sybase SQL Server, is a high-performance relational database server that can…

Continue ReadingCritical Vulnerabilities in SAP Adaptive Server Enterprise (ASE)
Read more about the article Apple Critical Security Updates May 2020

Apple Critical Security Updates May 2020

  • Post author:Jithendra R
  • Post published:May 27, 2020
  • Post category:Security Research and Intelligence
  • Post comments:0 Comments
  • Reading time:3 mins read

Apple released security updates for multiple products. A total of 59 vulnerabilities were addressed. The exploitation of some of these…

Continue ReadingApple Critical Security Updates May 2020
  • 1
  • 2
  • Go to the next page

Latest SecPod Webcast

Subscribe

Don't miss out!

Subscribe to our newsletter and get the latest updates.

We promise not to spam you. Unsubscribe at any time.
Invalid email address
Thanks for subscribing!

SanerNow Free Trial

Top Posts

  • Cisco IOS XR Zero Day Vulnerability Being Actively Exploited in the Wild
  • Microsoft May 2022 Patch Tuesday Addresses 75 Vulnerabilities Including 3 Zero-Days
  • F5 BIG-IP Critical Remote Code Execution Vulnerability Getting Exploited. Patch Now!
  • Oracle Releases Critical Security Updates for April 2022 – Patch Now!
  • Vulnerability Scanning Software: Inspections of Your Endpoints’ Infections

Recent Comments

  • Instantvitalrecords on MongoDB – Merging Data into an Existing Document
  • David on Microsoft February 2022 Patch Tuesday Addresses 57 Vulnerabilities Including a Zero-Day
  • jenne on Seven new Meltdown and Spectre-type CPU vulnerabilities that affect Intel, AMD, ARM CPUs
  • Jani PRJ on Critical Remote Code Execution Vulnerabilities in MyBB Forum Software
  • Anusha on How to Measure the Efficacy of Your Vulnerability Management Program?

Archives

Categories

About SecPod

SecPod is a cyber security technology company. We prevent cyberattacks. We do everything to prevent attacks on the computing environment. Our products help implement cyber hygiene measures, so attackers have a tough time piercing through.

Stay Ahead of Attackers

  • Security Research and Intelligence
  • Endpoint Security and Management
  • Cyber Hygiene Framework
  • COVID-19
  • Technology and Trends
  • Remote Work
  • Security Automation

SanerNow Platform

  • Vulnerability Management
  • Patch Management
  • Compliance Management
  • Asset Management
  • Endpoint Management

Never Miss a Post

DON'T MISS OUT!

Subscribe to our updates

We promise not to spam you. Unsubscribe at any time.
Invalid email address
Thanks for subscribing!
Copyright 2022 - SecPod. All Rights Reserved.