Skip to content
SecPod Blog
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • About SecPod
    • Company
    • SecPod Culture
    • From CEO’s Desk
  • Contact
    • Contact Us
    • Schedule a SanerNow Demo
  • Subscribe Newsletter
  • Toggle website search
Search this website
Menu Close
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • About SecPod
    • Company
    • SecPod Culture
    • From CEO’s Desk
  • Contact
    • Contact Us
    • Schedule a SanerNow Demo
  • Subscribe Newsletter
  • Toggle website search
Read more about the article High-Severity Remote Code Execution Vulnerability in Google Chrome

High-Severity Remote Code Execution Vulnerability in Google Chrome

  • Post author:Jithendra R
  • Post published:August 26, 2020
  • Post category:Security Research and Intelligence
  • Reading time:3 mins read

A high-severity 'use-after-free vulnerability tracked as CVE-2020-6492 with a CVSSv3 base score of 8.3 exists in WebGL [Web Graphics Library]…

Continue ReadingHigh-Severity Remote Code Execution Vulnerability in Google Chrome
Read more about the article Patch Tuesday: Microsoft Security Bulletin Summary for August 2020

Patch Tuesday: Microsoft Security Bulletin Summary for August 2020

  • Post author:Jithendra R
  • Post published:August 12, 2020
  • Post category:Security Research and Intelligence
  • Reading time:17 mins read

Microsoft Security Bulletin August 2020 was released, addressing a total number of 120 vulnerabilities, including two Zero-days in the family of…

Continue ReadingPatch Tuesday: Microsoft Security Bulletin Summary for August 2020
Read more about the article High-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password

High-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password

  • Post author:Jithendra R
  • Post published:August 7, 2020
  • Post category:Security Research and Intelligence
  • Reading time:4 mins read

A high-risk vulnerability was found in TeamViewer for Windows. It is tracked as "CVE-2020-13699", with a CVSS base score of…

Continue ReadingHigh-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password
Read more about the article Patch Tuesday: Microsoft Security Bulletin Summary for July 2020

Patch Tuesday: Microsoft Security Bulletin Summary for July 2020

  • Post author:Jithendra R
  • Post published:July 15, 2020
  • Post category:Security Research and Intelligence
  • Reading time:16 mins read

Microsoft Patch Tuesday July 2020 has released July Patch Tuesday security updates, addressing a massive number of 123 vulnerabilities and…

Continue ReadingPatch Tuesday: Microsoft Security Bulletin Summary for July 2020
Read more about the article Critical Vulnerabilities in Palo Alto Networks PAN-OS devices

Critical Vulnerabilities in Palo Alto Networks PAN-OS devices

  • Post author:Jithendra R
  • Post published:July 10, 2020
  • Post category:Security Research and Intelligence
  • Reading time:4 mins read

Palo Alto Network (PAN) has recently fixed a critical vulnerability, related to the PAN-OS operating systems. The operating systems are…

Continue ReadingCritical Vulnerabilities in Palo Alto Networks PAN-OS devices
Read more about the article Apache Guacamole Critical Vulnerabilities Put Remote Desktops at Risk

Apache Guacamole Critical Vulnerabilities Put Remote Desktops at Risk

  • Post author:Jithendra R
  • Post published:July 3, 2020
  • Post category:Security Research and Intelligence
  • Reading time:5 mins read

Security researchers at Check Point have uncovered multiple critical reverse RDP vulnerabilities in the Apache Guacamole. Apache Guacamole is a…

Continue ReadingApache Guacamole Critical Vulnerabilities Put Remote Desktops at Risk
Read more about the article ‘Ripple20’ Vulnerabilities Affecting Millions of Internet Connected Devices Worldwide

‘Ripple20’ Vulnerabilities Affecting Millions of Internet Connected Devices Worldwide

  • Post author:Jithendra R
  • Post published:June 18, 2020
  • Post category:Security Research and Intelligence
  • Reading time:6 mins read

Treck TCP/IP is a high-performance TCP/IP protocol suite designed for embedded systems. A set of 19 critical and high-severity security…

Continue Reading‘Ripple20’ Vulnerabilities Affecting Millions of Internet Connected Devices Worldwide
Read more about the article A Critical Vulnerability ‘SMBleed’ Impacts Windows SMB Protocol

A Critical Vulnerability ‘SMBleed’ Impacts Windows SMB Protocol

  • Post author:Jithendra R
  • Post published:June 11, 2020
  • Post category:Category(Default) - Do Not Use This/Security Research and Intelligence
  • Reading time:6 mins read

The Server Message Block Protocol (SMB protocol) which runs over TCP port 445 is a client-server communication protocol used for…

Continue ReadingA Critical Vulnerability ‘SMBleed’ Impacts Windows SMB Protocol
Read more about the article Critical Vulnerabilities in SAP Adaptive Server Enterprise (ASE)

Critical Vulnerabilities in SAP Adaptive Server Enterprise (ASE)

  • Post author:Jithendra R
  • Post published:June 4, 2020
  • Post category:Security Research and Intelligence
  • Reading time:6 mins read

The SAP Adaptive Server Enterprise (ASE), previously known as Sybase SQL Server, is a high-performance relational database server that can…

Continue ReadingCritical Vulnerabilities in SAP Adaptive Server Enterprise (ASE)
Read more about the article Apple Critical Security Updates May 2020

Apple Critical Security Updates May 2020

  • Post author:Jithendra R
  • Post published:May 27, 2020
  • Post category:Security Research and Intelligence
  • Reading time:4 mins read

Apple released security updates for multiple products. A total of 59 vulnerabilities were addressed. The exploitation of some of these…

Continue ReadingApple Critical Security Updates May 2020
  • 1
  • 2
  • Go to the next page

Latest Webcast

Subscribe

Don't miss out!

Subscribe to our newsletter and get the latest updates.

We promise not to spam you. Unsubscribe at any time.
Invalid email address
Thanks for subscribing!

SanerNow Free Trial

Top Posts

  • Apple Fixes Multiple Security Vulnerabilities Including Three Zero-day Exploits!
  • Implementing Gartner Vulnerability Management Recommendations with SanerNow
  • Are Multiple VPNs Adversely Affecting IT Security?
  • Microsoft May 2023 Patch Tuesday Fixes 38 Vulnerabilities Including 3 Zero-day!
  • Navigating the Patch Management Lifecycle: From Identification to Validation

Recent Comments

  • Anna on Is “Prevention, Detection and Response” Uproar in the Information Security Industry?
  • ClearNetwork on No Alert Holidays With SanerNow
  • andrew on Endpoint Detection and Response: The Forthcoming of Incident Response and Cybersecurity
  • visitor on Apache Wicket : Defeating Encrypted And Stateful URLs
  • Mutakiu Hassan on Microsoft May 2022 Patch Tuesday Addresses 75 Vulnerabilities Including 3 Zero-Days

Archives

Categories

Copyright 2023 - SecPod. All Rights Reserved.