software-vulnerabilities
How to Streamline the Vulnerability Management Life Cycle
Alex Vakulov | | Information Security, software-vulnerabilities, System Vulnerabilities, vulnerability, Vulnerability Management
Establishing a vulnerability management process is a crucial part of an organization's cybersecurity strategy and demands thoughtful planning ...
Security Boulevard
Rezilion Releases New Smart Fix Capability, Delivering Intelligent Guidance for Patching
rezilion | | patch management, smart fix, software-vulnerabilities, Uncategorized, Vulnerability Management
NEW YORK, May 31, 2023 – Rezilion, an automated software supply chain security platform, today announced the release of its new Smart Fix feature in the Rezilion platform, which offers critical guidance ...
ProxyShell or ProxyNotShell? Let’s Set The Record Straight
Ofri Ouzan | | Application Security, patch management, ProxyNotShell, ProxyShell, Rezilion research, Software Attack Surface Management, software-vulnerabilities, Uncategorized, Vulnerability Management
Before diving into ProxyNotShell, we will start by giving some context regarding the original ProxyShell vulnerabilities. On BlackHat USA 2021, Orange Tsai (a 0-day researcher focusing on web/application security) revealed the three ...
White House Releases Software Supply Chain Security Guidance
Nathan Eddy | | executive order cybersecurity, software supply chain, software-vulnerabilities, White House
The White House published a memo requiring agencies to comply with guidance from the Office of Management and Budget (OMB) which aims to improve software supply chain integrity and security. Signed by OMB Director ...
Security Boulevard
What government agencies need to know about CISA’s new Binding Operational Directive
Lindsey Stalnaker | | binding operational directive, CVE, Cybersecurity, federal agencies, government compliance, Government security, software-vulnerabilities, Web Security Zone
The Cybersecurity and Infrastructure Security Agency (CISA) is reinforcing the nation’s cybersecurity efforts by announcing a new Binding Operational Directive (BOD) related to common vulnerabilities and exposures. Also referred to as CVEs, ...
DEF CON 29 Aerospace Village – Brandon Bailey’s ‘Unboxing The Spacecraft Software BlackBox – Hunting For Vulnerabilities’
Marc Handelman | | Aerospace Conferences, Aerospace Security, Aerospace Village, Application Security, cybersecurity education, DEF CON, DEF CON 29, education, Industrial Security, Information Security, Infosec Education, security, Security Education, software-vulnerabilities
Our thanks to DEFCON for publishing their outstanding DEFCON 29 Aerospace Village videos on the organizations’ YouTube channel. Permalink ...
CWE-77
Improper Neutralization of Special Elements used in a Command (‘Command Injection’)CWE-77 refers to command injection, a vulnerability that allows malicious parties to control parts of the application by providing input that influences ...