Sierra Flaws Cyber Attack: Router Vulnerabilities Unveiled

In a recent scrutiny of Sierra wireless routers, Forescout’s Vedere Labs uncovered 21 novel vulnerabilities that, though relatively straightforward to exploit, pose historical challenges for enterprises to rectify. Forescout’s Vedere Labs outlined ...

Chrome Exploits Patched To Secure Your Browsing

In a bid to fortify the security of its Chrome browser, Google has swiftly addressed seven vulnerabilities, with one particularly menacing zero-day exploit. This critical flaw, identified as CVE-2023-6345, centers around an ...

The SLP Vulnerability KEV Alert By CISA

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a notable update incorporating a high-severity vulnerability in the Service Location Protocol (SLP) into its Known Exploited Vulnerabilities (KEV) catalog. This decision stems ...

The Cyber Threat Landscape Overview with An Example

The threat landscape is the ever-evolving landscape of cybersecurity threats, vulnerabilities, and attackers. As businesses move more of their operations online, the threat landscape has expanded to include new types of threats ...
The threat landscape: What it is and why it matters

The Threat landscape: What it is and why it matters

The threat landscape is the ever-evolving landscape of cybersecurity threats, vulnerabilities, and attackers. It is constantly changing as new threats are discovered, new vulnerabilities are exploited, and new attackers emerge. The threat ...

FBI Alert: Dual Ransomware Attack Surge

In recent times, cybersecurity threats and dual ransomware incidents have evolved, affecting organizations worldwide. The Federal Bureau of Investigation (FBI) has issued a warning about a troubling trend pertaining to dual ransomware ...
ransomware landscape, defenders, cybersecurity ransomware

Known Vulnerabilities Drove Most Cyberattacks in 2022

New research revealed an all-too-familiar theme: Known vulnerabilities for which patches have been issued were the main way threat actors executed cyberattacks in 2022. “The data highlights that long-known vulnerabilities frequently cause ...
Security Boulevard

CISO Interview Series: The thinking of a CISO at the front end of the cyber threat landscape.

What are the most important areas for a CISO to focus on?  When speaking to Aman Sood, it becomes clear that the job of a CISO encompasses every aspect of a business.  ...
The Four Pillars of a Cybersecurity Strategy That Works

The Four Pillars of a Cybersecurity Strategy That Works

Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization’s defensive posture is another. Threat intelligence empowers organizations by providing them with the knowledge and ...
Is our Digital Future at risk? Cyber Security Challenges for 2022

Security Challenges for Businesses in 2022

See which challenges should be top of mind for keeping businesses online and growing in the coming months and years. The post Security Challenges for Businesses in 2022 appeared first on Radware ...

Application Security Check Up