Topic: vulnerabilities

AMNESIA:33

How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices Executive summary Forescout Research Labs has launched Project Memoria, an initiative that aims at providing the community with the largest study on the security of TCP/IP stacks. Project Memoria’s goal is to develop the understanding of common bugs behind the vulnerabilities in TCP/IP …

AMNESIA:33 Read More »

2020 State of Security Operations

The 2020 State of Security Operations Report takes a close look at the front lines of IT security: security operations. For our survey, we wanted to talk to the people who find and mitigate vulnerabilities, detect threats, perform security investigations, respond to incidents, and do countless other operational tasks on a daily basis. We also …

2020 State of Security Operations Read More »

A Security Audit of Australian Government Websites

Introduction – A Security Audit of Australian Government Websites Data confidentiality and content integrity in end-to-end communications are critical features of today’s online Web services. Being the cryptographic foundation of the Web, the Hyper Text Transfer Protocol Secure (HTTPS) leverage Transport Layer Security (TLS) protocol to ensures that webpages are secure against external entities eavesdropping …

A Security Audit of Australian Government Websites Read More »

Nokia Threat Intelligence Report

Introduction – Nokia Threat Intelligence Report This report provides a view of malware activity in mobile and fixed networks around the world. The data in this report has been aggregated from service provider networks where Nokia’s NetGuard Endpoint Security solution is deployed. This network-based malware detection solution enables Nokia customers to monitor their fixed and …

Nokia Threat Intelligence Report Read More »

Orca Security 2020 State of Virtual Appliance Security

To help move the cloud security industry forward and reduce risk for customers, Orca Security conducted a wide-reaching research and testing project to benchmark the current state of virtual appliance security. Virtual appliances are cheap and easy for software vendors to distribute. Fully preconfigured with all requisite software, they’re often delivered ready for customers to …

Orca Security 2020 State of Virtual Appliance Security Read More »

License to Kill: Leveraging License Management to Attack ICS Networks

Claroty researchers have found six vulnerabilities in Wibu-Systems AG’s CodeMeter product, a solution widely used in the ICS domain as a license-management and antipiracy tool. The vulnerabilities collectively earned the highest criticality CVSS score of 10.0, and can be exploited in denial-of-service attacks, or to achieve remote code execution. Wibu-Systems’ CodeMeter is used in critical …

License to Kill: Leveraging License Management to Attack ICS Networks Read More »

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020

Introduction Security leaders, while supporting business growth and digital transformation, struggle with a multitude of challenges.We know this because you tell us, both in ongoing conversations and as part of our annual benchmark survey.Some challenges are focused on security, such as needing better visibility or automation, or striving for greater simplicity of management and response.Some …

Securing What’s Now and What’s Next: 20 Cybersecurity Considerations for 2020 Read More »

Scroll to Top