Topics that are top of mind for the week ending July 15 | Government cybersecurity efforts tripped by technical debt. Neglect SaaS security at your own risk. A ranking of the most dangerous software weaknesses. Lessons learned about critical infrastructure security. And much more!
Learn about well-known vulnerabilities and attacks and how they affected critical infrastructure —from Phone Phreaking to recent ransomware.
Microsoft addresses 84 CVEs in its July 2022 Patch Tuesday release, including four critical flaws and one zero day that has been exploited in the wild.
一直以來，Nessus 都是弱點評估領域無庸置疑的領導者。 利用新推出的 Nessus Expert，現在您就能在整個雲端基礎架構中避免新興的網路威脅，並瞭解您的外部攻擊破綻中有哪些資產。
Topics that are top of mind for the week ending July 1 | Cybersecurity budgeting priorities. All you ever wanted to know about ransomware. CISOs weigh best-of-breed vs. platforms. The epidemic of identity-related breaches. And much more!
New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month.
The latest research from Forescout’s Vedere Labs explores the state of risk management in operational technology through the lens of 56 insecure-by-design vulnerabilities.
XML External Entity (XXE) flaws present unique mitigation challenges and remain a common attack path. Learn how XXE flaws arise, why some common attack paths are so challenging to mitigate and how Tenable.io Web Application Scanning can help.
CVE-2022-27511、CVE-2022-27512：Patches for Two Citrix Application Delivery Management VulnerabilitiesJune 17, 2022
Citrix patches a “nasty bug” in its Application Delivery Management solution that is difficult to exploit.
Key vulnerabilities you can’t ignore. Best practices to improve operational technology (OT) cybersecurity. A reality check on shift left, DevSecOps and cloud security. Tackling the security skills gap. Healthcare data breaches. And much more!
It’s time to crown the winners of this year’s Capture the Flag Event! This event presented a series of security-related challenges in a Jeopardy-style format. Challenges ranged in difficulty and to...