Critical Alert: Spring Core(SpringShell) Remote Code Execution Vulnerability Exploited In The Wild

The Spring Framework is an application framework and inversion of the control container for the Java platform developed by VMware.…

Continue ReadingCritical Alert: Spring Core(SpringShell) Remote Code Execution Vulnerability Exploited In The Wild

Apple Has Addressed A Zero-Day Vulnerability Which Is Being Actively Exploited In The Wild

This year, Apple released security updates for their third zero-day vulnerability. The affected software processes maliciously crafted web content, leading…

Continue ReadingApple Has Addressed A Zero-Day Vulnerability Which Is Being Actively Exploited In The Wild

Log4Shell-Critical Remote Code Execution Vulnerability in H2database Console

JFrog has recently disclosed a remote code execution vulnerability on H2 Database consoles. This is based on a Java Naming…

Continue ReadingLog4Shell-Critical Remote Code Execution Vulnerability in H2database Console

Intel Addresses 3 High Severity Vulnerabilities in BIOS of Several Processors

Intel has recently disclosed a short advisory with details of high-severity for 3 CVEs here. They are CVE-2021-0157, CVE-2021-0158, and…

Continue ReadingIntel Addresses 3 High Severity Vulnerabilities in BIOS of Several Processors

Microsoft November 2021 Patch Tuesday Addresses 55 Vulnerabilities Including 6 zero-days

Microsoft has released November Patch Tuesday security updates with a total of 55 Vulnerabilities, including six Zero-days rated as critical,…

Continue ReadingMicrosoft November 2021 Patch Tuesday Addresses 55 Vulnerabilities Including 6 zero-days

Cisco Releases Security Updates for Multiple Products

Cisco has released security updates to address critical, high, and medium severity¬†vulnerabilities for twelve different Cisco products. Advisories released for…

Continue ReadingCisco Releases Security Updates for Multiple Products

Top Metrics that Define the Success of a Vulnerability Management Program

Ponemon Institute notes that around 60% of breaches could have been easily avoided if organizations had included a vulnerability management…

Continue ReadingTop Metrics that Define the Success of a Vulnerability Management Program