Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2020-09-28 19:31:53 |
Cybersecurity: How to properly perform vulnerability assessments in your organization (lien direct) |
Assessing the security posture of devices is an important part of securing data and communications. Follow these steps to make sure you do it correctly. |
Vulnerability
|
|
|
|
2020-09-21 12:04:26 |
Windows Server: Patch this critical flaw now says Homeland Security in emergency warning (lien direct) |
Government agencies in the US have until today to patch a Windows Server vulnerability that could give hackers control over federal networks. |
Vulnerability
|
|
|
|
2020-08-19 15:56:03 |
IBM finds vulnerability in IoT chips present in billions of devices (lien direct) |
Manufactured by Thales, the EHS8 module family has security flaws that could allow attackers to take total control over internet-connected industrial machines. |
Vulnerability
|
|
|
|
2020-06-08 14:25:23 |
How open source software vulnerabilities create risk for organizations (lien direct) |
Security flaws in open source software have increased and can take a long time to be added to the National Vulnerability Database, says RiskSense. |
Vulnerability
|
|
|
|
2020-04-27 20:36:16 |
How to protect your data against the Mail.app vulnerability in Apple devices (lien direct) |
A recent bug discovered can allow your device to be compromised through Apple's default Mail application, but until a patch is released, follow these steps to protect yourself. |
Vulnerability
|
|
★★★
|
|
2020-04-21 17:46:41 |
How organizations can better manage and prioritize security patches (lien direct) |
Discovering how not to treat all vulnerabilities as equal is a key strategy in patch management, says risk-based vulnerability firm Kenna Security. |
Vulnerability
|
|
★★★
|
|
2020-04-03 15:32:31 |
Clinical AI startup Jvion launches COVID community vulnerability map (lien direct) |
Calling existing case data "retrospective and incomplete," the company said the map identifies populations likely to experience severe outcomes once infected. |
Vulnerability
|
|
★★★★
|
|
2020-03-10 14:50:48 |
Intel\'s data center CPUs vulnerability could lead to "devastating" attacks (lien direct) |
Security researchers found vulnerabilities that can affect multi-tenant environments such as public clouds or shared enterprise workloads. |
Vulnerability
|
|
|
|
2019-10-18 19:02:00 |
What is a zero-day vulnerability? (lien direct) |
Find out what a zero-day vulnerability is and if there's anything you can do to protect yourself against them. |
Vulnerability
|
|
|
|
2019-10-11 19:20:46 |
SafeBreach catches vulnerability in controversial HP Touchpoint Analytics software (lien direct) |
After being notified on July 4, HP waited four months before releasing a security advisory. |
Vulnerability
|
|
★★★★★
|
|
2019-08-29 15:33:03 |
How HackerOne empowers independent hackers to improve security (lien direct) |
Enabling responsible vulnerability disclosure programs protects companies and hackers in their endeavor to squash software bugs. |
Vulnerability
|
|
|
|
2019-08-09 10:23:01 |
Microsoft\'s new vulnerability tracking service is about IT productivity (lien direct) |
With so many threats and vulnerabilities to deal with, just knowing which actions you should prioritize can be hard. The new Threat & Vulnerability Management service from Microsoft should help. |
Threat
Vulnerability
|
|
★★
|
|
2019-08-01 15:10:05 |
How to build a vulnerability response plan: 6 tips (lien direct) |
Cybersecurity vulnerabilities continue to increase, and automated scanners can't always detect the most critical ones, according to Bugcrowd. |
Vulnerability
|
|
|
|
2019-07-29 15:40:05 |
Vulnerability in VxWorks RTOS allows attackers to control internal networks (lien direct) |
Internet-connected devices powered by VxWorks 6.5 and newer are affected by a vulnerability that allows remote attackers full control over targeted devices. |
Vulnerability
|
|
★★★
|
|
2019-07-09 14:42:00 |
How to secure your Zoom conference line from hackers (lien direct) |
A Zero Day vulnerability allows any website to open up a video-enabled call on a Mac with the Zoom app installed. Here's how to patch it. |
Vulnerability
|
|
|
|
2019-06-13 18:25:00 |
Hospital medical equipment contains potentially lethal vulnerability (lien direct) |
A vulnerability in the Windows CE-powered Alaris Gateway Workstation allows attackers to modify dosage rates for infusion pumps, which can have lethal results. |
Vulnerability
|
|
|
|
2019-06-12 13:07:05 |
Evernote Chrome extension vulnerability allowed attackers to steal 4.7M users\' data (lien direct) |
A cross-site scripting vulnerability was discovered popular note-taking application Evernote, though the company patched it in under a week. |
Vulnerability
|
|
|
|
2019-05-24 12:22:01 |
Nessus expands vulnerability scanner offerings to 16 IPs in commercial environments (lien direct) |
Tenable introduced the free Nessus Essentials product, and also discussed the wisdom of building apps in Electron, along with fixes for Spectre and Meltdown. |
Vulnerability
|
|
★★★
|
|
2019-05-14 14:17:00 |
Slack vulnerability allows attackers to intercept, modify downloads (lien direct) |
Improper handling of a custom URI creates a vulnerability for users of the Slack Desktop client on Windows. |
Vulnerability
|
|
|
|
2019-04-09 13:48:00 |
Vulnerability in Verizon Fios Quantum Gateway allows attackers to gain root privileges (lien direct) |
The vulnerability requires local access to be exploited, though Tenable Research claims it can be exploited remotely through the assistance of social engineering. |
Vulnerability
|
|
|
|
2019-03-28 18:37:00 |
Unpatched vulnerability in MikroTik RouterOS enables easily exploitable denial of service attack (lien direct) |
Despite having nearly a year to address the vulnerability, no patch is available for a critical vulnerability, leaving network admins no alternative to disabling IPv6 support. |
Vulnerability
|
|
|
|
2019-03-22 13:06:00 |
Windows 10 DHCP vulnerability allows for remote code execution (lien direct) |
The vulnerability in Windows 10 and Windows Server 2019 gives attackers an entry point for further exploitation when combined with other vulnerabilities. |
Vulnerability
|
|
★★★
|
|
2019-03-21 13:55:00 |
Vulnerability in Android Instant Apps can be used to steal history, authentication tokens (lien direct) |
Google's Instant Apps feature allows you to try apps before installing them, though a vulnerability allows attackers to abuse the feature to steal data. |
Vulnerability
|
|
|
|
2019-02-27 18:59:03 |
Software vulnerabilities are becoming more numerous, less understood (lien direct) |
Operating a database of software vulnerabilities is a challenging undertaking, according to private vulnerability database operator Risk Based Security. |
Vulnerability
|
|
|
|
2019-01-25 18:46:01 |
Major vulnerability found in Android ES File Explorer app (lien direct) |
Popular application ES File Explorer for Android has a significant vulnerability, putting your data at risk. Learn what's involved and how to remediate the threat. |
Vulnerability
|
|
|
|
2018-11-12 18:42:01 |
How CIOs can manage blockchain security: 4 tips (lien direct) |
By 2020, an exploited vulnerability will disrupt a major blockchain platform, causing significant damage, Gartner predicts. Here's how to protect your blockchain efforts. |
Vulnerability
|
|
|
|
2018-10-30 20:22:01 |
What we need to worry about with election hacking (lien direct) |
Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective. |
Guideline
Vulnerability
|
|
|
|
2018-09-28 18:32:01 |
Facebook discloses network breach affecting 50 million user accounts (lien direct) |
Facebook said attackers exploited a vulnerability in its code that let them steal access tokens when users switched over to a public profile view via the "View As" feature. |
Vulnerability
|
|
|
|
2018-08-28 15:39:00 |
Microsoft Windows zero-day vulnerability disclosed through Twitter (lien direct) |
There is no known workaround for the security flaw. |
Vulnerability
|
|
★★
|
|
2018-08-10 14:22:01 |
How some business Macs could get hacked right out of the box (lien direct) |
A new report from Wired reveals a common vulnerability in Macs that exploits DEP and MDM platforms. |
Vulnerability
|
|
|
|
2018-07-23 13:24:01 |
4 exploitable bugs plague Intel Management Engine: Patch now (lien direct) |
Some of the flaw require privileged access, but a buffer overflow vulnerability is fairly serious. |
Vulnerability
|
|
|
|
2018-06-29 12:14:03 |
Every Android device from the last 6 years may be at risk to RAMPage vulnerability (lien direct) |
Researchers have found yet another avenue to exploit a hardware vulnerability that previous patches have sought to mitigate |
Vulnerability
|
|
|
|
2018-06-27 11:41:01 |
New Windows 10 vulnerability bypasses OS defenses, says security researcher (lien direct) |
Vulnerability could be exploited to run arbitrary code on PCs. |
Vulnerability
|
|
|