The vast majority of successful breaches into corporate networks last year were caused by vulnerable web applications, according to a Kaspersky Lab analysis of penetration tests. Against a backdrop of increasingly-common remote and cloud-based working …Continue Reading
WordPress CMS installations are vulnerable to a PHP bug related to data deserialization (also known as unserialization), a security researcher has revealed at the start of the month. The bug has been reported to the WordPress team on February 28, 2017,…Continue Reading
Quttera announced the launch and immediate availability of its Web Application Firewall (WAF). The new firewall is provided as a managed service that protects from application layer attacks, including all OWASP top 10, zero-day threats and much more. T…Continue Reading
A quick and efficient patch also needs a quick and efficient certification. To maintain security over a product’s lifetime, it is a best practice for companies to implement a vulnerability management process. In this process, a team of experts continua…Continue Reading
In this podcast recorded at Black Hat USA 2018 , Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys , talks about endpoint breach prevention by reducing attack surfaces.
Here’s a transcript of the podcast for your convenience. Wel…Continue Reading
The history of firewalling technology is one of a gradual movement, in technological terms, from passivity to activity. The first iterations of hardware and software firewalls were merely port filters — disallowing incoming packets based on the require…Continue Reading
Promoted by Sangfor
The lack of certified and suitably-trained cybersecurity personnel is causing medium to large enterprises the type of significant problems which bedevil smaller organizations. With ransomware and other malware attacks making the ne…Continue Reading
12 Check Point’ Cyber attacks targeting IoT and network router vulnerabilities doubled since May 2018, says Check Point’s latest Global Threat Index.
(NASDAQ: CHKP), a leading provider of cyber-security solutions globally, has published its latest…Continue Reading
We chatted with Mark Brooks, Alert Logic’s global VP of solution engineering, to understand how to better manage containers. Alert Logic provides protection to all layers of web applications and the infrastructure stack. Mark provides useful insights i…Continue Reading
SEC Consult Vulnerability Lab Security Advisory ======================================================================= title: SQL Injection, XSS & CSRF vulnerabilities product: Pimcore vulnerable version: 5.2.3 and below fixed version: 5.3.Continue Reading