vulnerabilities

Access:7

Executive Summary Vedere Labs and CyberMDX have identified 7 vulnerabilities affecting the PTC Axeda agent, which we are collectively calling Access:7. Exploiting these vulnerabilities, attackers with network access to a target device could remotely execute code, access its file system or alter system configurations. The Axeda solution enables device manufacturers to remotely access and manage […]

Access:7 Read More »

2022 State of the Phish

Last year, we titled our introduction “A Year Like No Other.” We could easily have repeated that heading to describe 2021. The year has left many organizations contemplating what “normal” will mean for their workforces going forward. Along with hybrid and remote work options, organizations are mulling the best ways to keep employees connected and

2022 State of the Phish Read More »

Ransomware: Through the Lens of Threat and Vulnerability Management

Since we published our 2021 Spotlight Report and index updates (1, 2, and 3) that highlighted key metrics, we have been tracking ransomware threats. We have been able to warn organizations and product vendors about ransomware threats and the specific vulnerabilities these threats are targeting through these reports. This report brings you trends that we

Ransomware: Through the Lens of Threat and Vulnerability Management Read More »

Cyber Security Report 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically

Cyber Security Report 2022 Read More »

Priority One Report 2022

Judging by activity on the Bugcrowd Security Knowledge Platform™ in 2021, growth in crowdsourced security carried over from 2020, driven by the shift to hybrid/ remote workplaces and re-imagined supply chains during the global pandemic and the digital transformation that followed. With the dust starting to settle but the cybersecurity skills gap still in force

Priority One Report 2022 Read More »