When is One Vulnerability Scanner Not Enough?

May 2, 2024 at 06:27AM Vulnerability scans, akin to antivirus software, rely on a database of known weaknesses. With a rapidly increasing number of vulnerabilities, a single scanning engine struggles to keep up. Incorporating multiple scanning engines, like Nuclei from Intruder, enhances coverage, revealing a broader view of the attack surface and minimizing exposure. This … Read more

NCSC Says Newer Threats Need Network Defense Strategy

April 19, 2024 at 12:36PM The NCSC warns that network defense strategies must adapt to newer threats, as attackers exploit vulnerabilities in network perimeter products like firewalls and VPNs. They suggest demanding security evidence from vendors, avoiding unverified products, reducing risk in self-hosted solutions, ensuring developer accountability, and adopting a cloud-first approach to security, emphasizing … Read more

Top Security Posture Vulnerabilities Revealed

January 30, 2024 at 06:12AM Summary: New Year brings new cybersecurity challenges. Regular security posture assessments and testing, such as vulnerability scans and breach simulations, are crucial for preemptive threat identification. Common vulnerabilities include deficiencies in detection systems, inadequate policies, testing practices, training, and risk appetite understanding. Mitigating these vulnerabilities requires industry-accepted frameworks and expert … Read more

Number of Cisco Devices Hacked via Unpatched Vulnerability Increases to 40,000

October 19, 2023 at 07:06AM Approximately 40,000 Cisco devices have been hacked through an unpatched vulnerability in the IOS XE. The vulnerability, identified as CVE-2023-20198, allows attackers to escalate privileges and gain control of the system. Cisco has not released patches and warns that the vulnerability has been exploited as a zero-day since mid-September. Vulnerability … Read more