Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

Microsoft April’s 2022 Patch Tuesday Addresses 119 Vulnerabilities Including 2 Zero-Days

CVE Research

Microsoft April’s 2022 Patch Tuesday Addresses 119 Vulnerabilities Including 2 Zero-Days

Microsoft has released April’s 2022 Patch Tuesday security updates for 119 detected vulnerabilities, including two zero-days and nine being rated as critical. Moreover, the products covered in April’s 2022 patch Tuesday security update include Windows User Profile Service, Windows Common Log File Sy...

Apr 12, 2022 • 6 min read

Critical Alert: Spring Core(SpringShell) Remote Code Execution Vulnerability Exploited In The Wild

CVE Research

Critical Alert: Spring Core(SpringShell) Remote Code Execution Vulnerability Exploited In The Wild

The Spring Framework is an application framework and inversion of the control container for the Java platform developed by VMware. Detected vulnerability with CVE-2022-22965 affects Spring Core and allows an attacker to send a specially crafted HTTP request to bypass protections in the library’s HTT...

Apr 04, 2022 • 4 min read

Apple Addressed High Severity Flaws in macOS, iOS – Patch Now

CVE Research

Apple Addressed High Severity Flaws in macOS, iOS – Patch Now

Apple April 2022 Security Update, two high severity zero-day flaws tracked as “CVE-2022-22674” and “CVE-2022-22675” have been reported in Apple macOS and iOS. Apple has released patches for these two zero-day CVEs affecting macOS and iOS. A critical vulnerability is, therefore, present in Apple macO...

Apr 03, 2022 • 2 min read

SanerNow’s Role in Strengthening Compliance Posture

CVE Research

SanerNow’s Role in Strengthening Compliance Posture

Millions of people are robbed of personal data like their credentials, social security numbers, bank account-credit card details, among others, on social media. These can be stopped by using a vulnerability management tool. Cybercriminals are engaged in their thieving escapade to impersonate people ...

Mar 28, 2022 • 6 min read

Lapsus$ Extortion Group: Large Tech Companies Suffer from Teen Attacks!

CVE Research

Lapsus$ Extortion Group: Large Tech Companies Suffer from Teen Attacks!

With cybersecurity threats on the rise, attackers use more sophisticated techniques to steal sensitive information. From small companies to large businesses, every tech company can be victim of cyber-attacks. Vulnerability Management System can prevent these attacks.

Mar 27, 2022 • 7 min read

Vulnerability Scanning vs Penetration Testing: Which is Better?

CVE Research

Vulnerability Scanning vs Penetration Testing: Which is Better?

When searching for cybersecurity tools, it often gets confusing to choose between penetration testing and vulnerability scanning.

Mar 22, 2022 • 4 min read

Adopt Enterprise Vulnerability Management Program to Survive in the Age of Advanced Cyberthreats

CVE Research

Adopt Enterprise Vulnerability Management Program to Survive in the Age of Advanced Cyberthreats

Today, many enterprises need cybersecurity solutions to deal with the growing IT security threats. Cyberattacks like ransomware are escalating the importance of vulnerability assessment, prioritization, and instant remediation for small, medium, and large-sized enterprises. Cyberhygiene measures con...

Mar 22, 2022 • 4 min read

Pandora Ransomware Hits Toyota’s Automotive Supplier Denso

CVE Research

Pandora Ransomware Hits Toyota’s Automotive Supplier Denso

A Pandora ransomware attack targeted Denso Corp, a supplier of Toyota Motor Corporation. The confirmation came after the Pandora Ransomware group leaked the stolen data and claimed responsibility. However, the attack has not resulted in any disruption in Denso’s operations. This is why it is essenti...

Mar 21, 2022 • 3 min read

Vulnerability Assessment Report: An Essential Step For Better Vulnerability Management

CVE Research

Vulnerability Assessment Report: An Essential Step For Better Vulnerability Management

Once the vulnerability assessment process is completed, security teams generate bulky reports for further analysis. Though these reports are detailed and covered with all the information, security teams find it hard to read them. Hence, they lag in drawing clear insights from these reports. Ultimate...

Mar 21, 2022 • 5 min read