What Is Vulnerability Management?

Some people still believe their IT infrastructure is unflawed simply because they’ve never experienced a cybersecurity incident – until something goes wrong and the company becomes the victim of a…

Ransomware Prevention Guide: What You Need to Know

Ransomware is a type of malware (malicious software) that encrypts all data on a computer or mobile device, preventing the owner from accessing it. Following the infection, the victim receives…

Software Patching Statistics: Common Practices and Vulnerabilities [Updated 2021]

This post is also available in: Danish Wondering about software patching statistics and what the current state of affairs on updates is? This is where you will find all the…

Sonicwall Customers That Are Using SMA 100 Series Appliances Were Urged to Patch Critical Bugs

SonicWall provides a variety of Internet appliances, the majority of which are aimed at content management and network security. SonicWall’s solutions are utilized by over 500,000 commercial clients in 215…

What Is a Virtual Patch and Why You Need It

Software vulnerabilities are one of the biggest nuisances for cybersecurity because cybercriminals love to exploit them. Read on to find out how you can be one step ahead by applying…

Cybersecurity Trends for 2022

Trend Micro – Trend Micro – You’ve heard it before: the pandemic accelerated digital transformation. And there doesn’t seem to be any signs of slowing down. But what does an…

A Critical Zoho ManageEngine Desktop Central and Desktop Central MSP Vulnerability Is Exploited by an APT Actor

Zoho ManageEngine Desktop Central is a popular management tool that administrators use for automatic software distribution and remote troubleshooting across the whole network. What Happened? An authentication bypass vulnerability in…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

The In-house Zoho ServiceDesk Exploit Used to Drop Webshells

You may recall that we reported a while ago that state-backed advanced persistent threat (APT) organizations had been actively exploiting a significant hole in a Zoho single sign-on and password…

GoDaddy Data Breach Update: Six WordPress Hosting Service Resellers Impacted

GoDaddy, one of the largest web hosting companies and domain registrars, has recently suffered a data breach that exposed approximately 1.2 million customers. The web hosting company also revealed that…