Get the latest updates on our product releases, enhancements, and issue fixes here.

How Many Checks Does Your Vulnerability Management Program Need?

A vulnerability database is a collection of information about security checks and patches. An efficient vulnerability management program needs a comprehensive vulnerability database…

Continue ReadingHow Many Checks Does Your Vulnerability Management Program Need?

False Positives and the story of Rob’s failed Vulnerability Management Program

Like most security admins, Rob is always on his toes to protect the digital infrastructure of his organization from bad…

Continue ReadingFalse Positives and the story of Rob’s failed Vulnerability Management Program

A Critical Vulnerability in Atlassian Confluence Server Under Active Exploitation

Atlassian Confluence recently published a security advisory to patch a critical OGNL(Object-Graph Navigation Language) injection vulnerability existing in Confluence Server…

Continue ReadingA Critical Vulnerability in Atlassian Confluence Server Under Active Exploitation

Microsoft Windows “PrintNightmare” Vulnerability Exploited in the Wild

A critical zero-day vulnerability has been discovered in Microsoft Windows Print Spooler. This high severity vulnerability dubbed as PrintNightmare is…

Continue ReadingMicrosoft Windows “PrintNightmare” Vulnerability Exploited in the Wild

Apple Patches Critical Zero-Day Vulnerabilities Actively Exploited in the Wild

Apple patches critical Zero-Day vulnerabilities on its various products in the latest May update. This release includes three critical zero-day…

Continue ReadingApple Patches Critical Zero-Day Vulnerabilities Actively Exploited in the Wild

Data Breaches are a Major Threat to Endpoint Security : SecPod Talks

The term data breach refers to any misfortunate event where confidential information is exposed to unauthorized users. Such incidents not…

Continue ReadingData Breaches are a Major Threat to Endpoint Security : SecPod Talks