5 Steps to Build an Effective Vulnerability Management Program
Vulnerability management program is a standardized process across most organizations. However, even organizations that follow periodic compliance audits and patch…
Vulnerability management program is a standardized process across most organizations. However, even organizations that follow periodic compliance audits and patch…
The scares of Halloween came very early this year in the form of COVID-19. Although organizations faced a lot of…
Oracle has addressed a critical Remote Code Execution (RCE) vulnerability in the rare out-of-band patch in numerous versions of Oracle…
A new zero-day vulnerability (CVE-2020-14871) in Oracle Solaris has been brought to light by the FireEye security research team, Mandiant.…
On October 20, 2020, the National Security Agency (NSA), a national-level intelligence agency of the United States Department of Defense,…
Google Project Zero disclosed details for a zero-day vulnerability CVE-2020-17087 found in the Windows operating system that being currently exploited…
Cyber-attacks are busting in from all directions. The biggest and most widespread attack was in 2017, called Wannacry. More than…
This year has forced us into a lot of new challenges in the digital world. During the first half of…
Critical Remote Code Execution (RCE) vulnerability CVE-2020-14882 in the console component of the Oracle WebLogic Server Exploitation allows unauthenticated, remote…
Vulnerability management has been a standard practice for more than 15 years now. Vulnerability Scanning tool, assessment, and remediation have…