Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

Patch Immediately! Critical Exchange Server Vulnerability Actively Exploited

CVE Research

Patch Immediately! Critical Exchange Server Vulnerability Actively Exploited

A recently discovered critical vulnerability in Microsoft Exchange Server (CVE-2024-21410) is being actively exploited by attackers. A privilege escalation vulnerability allows attackers to use leaked login credentials (like those from compromised Outlook clients) to gain unauthorized access and con...

Feb 14, 2024 • 2 min read

The February 2024 Microsoft Patch Tuesday Addresses 73 Vulnerabilities, Including 2 zero-day exploits

CVE Research

The February 2024 Microsoft Patch Tuesday Addresses 73 Vulnerabilities, Including 2 zero-day exploits

Microsoft’s latest security updates for Patch Tuesday in February 2024 address a total of 73 vulnerabilities. Among these, five are classified as critical, including two zero-day vulnerabilities (CVE-2024-21351 and CVE-2024-21412), with thirty vulnerabilities linked to remote code execution. The uti...

Feb 13, 2024 • 3 min read

Strengthening Vulnerability Management Using the CMDB Feature in SanerNow

CVE Research

Strengthening Vulnerability Management Using the CMDB Feature in SanerNow

Feb 12, 2024 • 2 min read

Mastering Remote Patch Management: Best Practices and Strategies

CVE Research

Mastering Remote Patch Management: Best Practices and Strategies

In the fast-paced world of technology, where businesses are increasingly reliant on digital infrastructure, maintaining a secure and up-to-date software environment is paramount. Remote patch management emerges as a crucial aspect of this process, ensuring that software vulnerabilities are addressed...

Feb 12, 2024 • 5 min read

Critical Security Updates: Cisco, Fortinet, and VMware Address Vulnerabilities

CVE Research

Critical Security Updates: Cisco, Fortinet, and VMware Address Vulnerabilities

In today’s digital age, cybersecurity remains a paramount concern for businesses worldwide. As cyber threats evolve in complexity and sophistication, organizations must stay vigilant and proactive in securing their systems and data. Recently, leading technology companies Cisco, Fortinet, and VMware ...

Feb 08, 2024 • 3 min read

Unveiling Order from Chaos: Device Tagging’s Role in Streamlining Vulnerability Management

CVE Research

Unveiling Order from Chaos: Device Tagging’s Role in Streamlining Vulnerability Management

The sophistication of cyber-attacks isn’t waning. The rise in ransomware attacks is sound proof of that. Instead, it adds to the security agony of every organization across geography.

Feb 07, 2024 • 4 min read

Risk Prioritization Strategies for Rapid Attack Surface Reduction

CVE Research

Risk Prioritization Strategies for Rapid Attack Surface Reduction

How many vulnerabilities do you have in your IT infrastructure right now? The odds are that the number could be thousands or even 10s of thousands and always rising too! And with software vendors releasing updates to their software almost daily, there’s always a constant chance for potential risk in...

Feb 04, 2024 • 4 min read

Watch out: GitLab patches a critical security bug in Workspace Creation. Patch Now!

CVE Research

Watch out: GitLab patches a critical security bug in Workspace Creation. Patch Now!

GitLab released multiple patches in its recent advisory published to fix a critical security issue along with four other security flaws on January 11th. Both Community and Enterprise Editions (CE & EE) are affected by these vulnerabilities, and patches have been released for the same in versions 16....

Feb 01, 2024 • 3 min read

True Prevention: Preventing Cyberattacks the Real Way

CVE Research

True Prevention: Preventing Cyberattacks the Real Way

What have you been doing for cyberattack prevention? Listing IT assets and assessing vulnerabilities alone? In the modern scenario of increasingly complex networks and evolving cyber threats, assessing vulnerabilities alone with traditional vulnerability management tools is just not enough.

Jan 31, 2024 • 4 min read