Top

Tag: vulnerabilities


BI Security

High-risk open source vulnerabilities on the rise, Synopsys reports

February 28, 2024

Via: InfoWorld

Nearly three-quarters of codebases assessed for risk by Synopsis in 2023 contained open source components with high-risk vulnerabilities, according to a just-released report from the company, a provider of application security testing tools. While the number of codebases with at […]


BI Security

5 Wi-Fi vulnerabilities you need to know about

February 14, 2024

Via: Network World

Effectively securing enterprise Wi-Fi networks is about more than simply setting up the latest encryption or implementing 802.1X authentication. Those are certainly important, but there are many more vulnerabilities to consider. Whether you’re trying to troubleshoot strange Wi-Fi behavior or […]


BI Security

CIOs must safeguard organizations with a validated Zero Trust solution

October 17, 2023

Via: CIO

Cyber vulnerabilities are among a CIO’s greatest fears. And with good reason. No industry or organization is immune to the growing frequency, sophistication and success of cyberattacks and the steep, often devastating, organizational costs they incur. Yet, after collectively investing […]


BI Security

Are you protected against vulnerabilities with known exploits?

March 2, 2023

Via: CIO

No IT leader wants to tell the C-suite about a serious breach that took advantage of a known infrastructure vulnerability. Hackers develop new attack strategies so often that it’s easy to forget a fundamental truth about cybersecurity: hackers don’t have […]


Software & Systems

Top 10 open source software risks for 2023

March 1, 2023

Via: InfoWorld

Known vulnerabilities, compromise of legitimate package, and name confusion attacks are expected to be among the top ten open source software risks in 2023, according to a report by Endor Labs. The other major open source software risks, according to […]


BI Security

Security Think Tank: Know your networks, know your suppliers

November 2, 2022

Via: ComputerWeekly

Ransomware changes rapidly. At a technical level, attack infrastructure can change by the minute, operationally changing attack techniques while strategically targeting certain sectors, industries or regions at appropriate times. Access brokers work across multiple groups, operators switch botnets, and malware […]


BI Security

Legacy vulnerabilities may be biggest enterprise cyber risk

May 25, 2021

Via: ComputerWeekly

Cyber attacks exploiting vulnerabilities in unpatched legacy systems, via consumer applications such as TikTok, and originating from friendly countries may be a bigger risk to the average organisation than attacks through novel zero-days conducted by Chinese or Russian APT groups, […]