CVE-2024-43451 and other reasons to update ASAP
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
13 articles
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
A new vulnerability allows remote attackers to gain root privileges on Linux servers. How easy is it for CVE-2024-6387 to be exploited – and how to prevent it
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Some thoughts on what PC software patches should be prioritized and why.
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
The networking giant D-Link has acknowledged and committed to fixing a very serious backdoor vulnerability in a number of its older routers. The vulnerability was uncovered by security researcher Craig
Microsoft (and Adobe for that matter) released a slew of security updates in the May 2013 edition of their monthly patch Tuesday release. As always, if your machine isn’t set