Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

Security Updates from Veeam: 18 Vulnerabilities Addressed, Including 5 Critical Threats

CVE Research

Security Updates from Veeam: 18 Vulnerabilities Addressed, Including 5 Critical Threats

Sep 05, 2024 • 3 min read

Safeguarding the Factory Floor: “Cybersecurity in Manufacturing”

CVE Research

Safeguarding the Factory Floor: “Cybersecurity in Manufacturing”

The world of manufacturing has always been about precision, efficiency, and innovation. But today, there’s a new element to consider “cybersecurity”. Manufacturing isn’t just about machines and assembly lines anymore, it’s also about protecting valuable digital assets from vulnerabilities. Cyber-cri...

Sep 05, 2024 • 4 min read

How North American SMBs Can Leverage Vulnerability Management to Stay Secure

CVE Research

How North American SMBs Can Leverage Vulnerability Management to Stay Secure

Stopping cyberattacks isn’t easy, but preventing them can be if you properly implement vulnerability management. However, managing vulnerabilities can be daunting, and small and medium-sized businesses (SMBs) around the world and in the North American region in particular are struggling. But why?

Sep 05, 2024 • 5 min read

Zyxel Users Beware: Critical OS Command Injection Flaw Threatens Routers

CVE Research

Zyxel Users Beware: Critical OS Command Injection Flaw Threatens Routers

Zyxel, a communications company, has released an advisory warning users of a critical input validation vulnerability impacting many of its router models. CVE-2024-7261, with a CVSS score of 9.8, could potentially allow unauthenticated attackers to perform OS command injection.

Sep 03, 2024 • 2 min read

Risk vs. Vulnerability Assessment: Should we Compare Them?

CVE Research

Risk vs. Vulnerability Assessment: Should we Compare Them?

With so much information/ data stored digitally or on the cloud, the risk it poses is unavoidable. Cyberattacks are rising, and attackers are getting sophisticated while planning an attack. The first step you take to overcome these attacks is to implement a strategy for risk reduction.

Aug 28, 2024 • 3 min read

What is Vulnerability Debt?

CVE Research

What is Vulnerability Debt?

We have a love-hate relationship with debt. But why am I talking about debt in a vulnerability management blog? Vulnerability debt is a new concept that has gained traction recently, and it is a great way to understand the impact vulnerabilities and security risks have on your network. So, lets dig ...

Aug 28, 2024 • 4 min read

Everything You Need to Know about PCI Vulnerability Management

CVE Research

Everything You Need to Know about PCI Vulnerability Management

Running a business isn’t easy. You have a lot of things to keep in mind. But on top of the list should be safeguarding your customer’s data. And if your business handles credit card information, you must have heard of PCI and PCI vulnerability management.

Aug 24, 2024 • 8 min read

Google Chrome 128 Update Resolves Critical Security Vulnerabilities!

CVE Research

Google Chrome 128 Update Resolves Critical Security Vulnerabilities!

Google has released Chrome 128, a significant update that addresses multiple high-severity vulnerabilities that could potentially impact the security and integrity of the widely used web browser. This update is crucial for users protect their systems against emerging threats.

Aug 21, 2024 • 3 min read

Vulnerability Management Workflow

CVE Research

Vulnerability Management Workflow

Vulnerability Management, the name itself says it all. We all know vulnerability management is crucial for companies and individuals to follow. But why is it important and what is the workflow each time we try to Kill a vulnerability? Everything we do, either has a ‘Yes’ or a ‘No’, right? The proces...

Aug 20, 2024 • 4 min read