How are bad actors getting access to organizations? In many cases, they simply log in. Sophos research finds that one of the most common…
unpatched
-
-
A high-severity flaw in Cisco’s data center switching gear could allow threat actors to read and modify encrypted traffic, according to the company. On…
-
Western Digital has blocked devices running vulnerable firmware versions from accessing its cloud services, the company said in an advisory. The move comes about…
-
Cloud SecurityNewsSecurity
Weak credentials, unpatched vulnerabilities, malicious OSS packages causing cloud security risks
Threat actors are getting more adept at exploiting common, everyday issues in the cloud, including misconfigurations, weak credentials, lack of authentication, unpatched vulnerabilities, and…
-
Known vulnerabilities as old as 2017 are still being successfully exploited in wide-ranging attacks as organizations fail to patch or remediate them successfully, according…
-
Security researchers from Eclypsium have developed a tool that enterprise administrators can use to scan their corporate networks or their remote employees’ home networks…
- 1
- 2