Recent Critical Vulnerabilities: August 2024 CVE Roundup

Protecting Organizations with Up-to-Date CVE Awareness  Reports from the National Institute of Standards and Technology (NIST) through its National Vulnerability Database (NVD) highlight critical cybersecurity vulnerabilities that demand immediate attention and underscore ...

CVE-2024-38178 Vulnerability within Microsoft Edge

High threat level vulnerability CVE-2024-38178 discovered on Microsoft Edge browser : OFFICIAL CVE-2024-38178 PATCHING INFORMATION : A recent discovery has unveiled CVE-2024-38178, a critical vulnerability within Microsoft Windows, which impacts Internet Explorer ...
OT, cyberattacks, internet cybersecurity BGP

Operational Technology (OT) Security a Top Priority for CIOs

The convergence of operational technology (OT) and information technology (IT) networks has created a complex environment increasingly vulnerable to cyberattacks, a challenge compounded by a backlog of legacy systems, an expanding attack ...
Security Boulevard

Recent Vulnerabilities in Cybersecurity: July 2024 CVE Roundup

Recent cybersecurity vulnerabilities reported on the National Institute of Standards and Technology (NIST)’s National Vulnerability Database pose significant risks to organizations worldwide. Without mitigation, data breaches and system compromises are possible. July’s ...
Top CVEs of July 2024: Key Vulnerabilities and Mitigations

Top CVEs of July 2024: Key Vulnerabilities and Mitigations

July 2024 has surfaced a series of significant vulnerabilities that could compromise the security of many organizations. From Bamboo Data Center flaws to critical issues in ServiceNow, these vulnerabilities present... The post ...
Tenable, application security, vulnerabilities, software, vulnerabilities, issues, servers, vulnerability, Linux, vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

Networking Equipment Riddled With Software Supply Chain Risks

Outdated software components often contain vulnerabilities that have been discovered and are well-understood by threat actors ...
Security Boulevard
A screenshot of Smart SOAR's playbook editor with the internal CVE search workflow

Threat Hunting in Smart SOAR

In modern cybersecurity operations, threat hunting has become an essential proactive defense strategy. Leveraging Security Orchestration, Automation, and Response (SOAR) playbooks enhances this activity, making it more efficient and effective. This blog ...
A screenshot of Smart SOAR's playbook editor with the internal CVE search workflow

Threat Hunting in Smart SOAR

In modern cybersecurity operations, threat hunting has become an essential proactive defense strategy. Leveraging Security Orchestration, Automation, and Response (SOAR) playbooks enhances this activity, making it more efficient and effective. This blog ...

OpenSSH regreSSHion (CVE-2024-6387): A Blast from the Past with Critical Repercussions

OpenSSH, a crucial tool in secure communications, has recently been impacted by a critical vulnerability identified as CVE-2024-6387, also known as “regreSSHion.” This blog will provide an overview of the... The post ...
SBOM

A Playbook for Detecting the OpenSSH Vulnerability – CVE-2024-6387 – regreSSHion

The Qualys Threat Research Unit has discovered a new “high” severity signal handler race condition vulnerability in OpenSSH’s server software (sshd). According to the research, this vulnerability has the potential to allow ...

Application Security Check Up