threat landscape
Sierra Flaws Cyber Attack: Router Vulnerabilities Unveiled
In a recent scrutiny of Sierra wireless routers, Forescout’s Vedere Labs uncovered 21 novel vulnerabilities that, though relatively straightforward to exploit, pose historical challenges for enterprises to rectify. Forescout’s Vedere Labs outlined ...
Chrome Exploits Patched To Secure Your Browsing
In a bid to fortify the security of its Chrome browser, Google has swiftly addressed seven vulnerabilities, with one particularly menacing zero-day exploit. This critical flaw, identified as CVE-2023-6345, centers around an ...
The SLP Vulnerability KEV Alert By CISA
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a notable update incorporating a high-severity vulnerability in the Service Location Protocol (SLP) into its Known Exploited Vulnerabilities (KEV) catalog. This decision stems ...
The Cyber Threat Landscape Overview with An Example
The threat landscape is the ever-evolving landscape of cybersecurity threats, vulnerabilities, and attackers. As businesses move more of their operations online, the threat landscape has expanded to include new types of threats ...
The Threat landscape: What it is and why it matters
The threat landscape is the ever-evolving landscape of cybersecurity threats, vulnerabilities, and attackers. It is constantly changing as new threats are discovered, new vulnerabilities are exploited, and new attackers emerge. The threat ...
FBI Alert: Dual Ransomware Attack Surge
In recent times, cybersecurity threats and dual ransomware incidents have evolved, affecting organizations worldwide. The Federal Bureau of Investigation (FBI) has issued a warning about a troubling trend pertaining to dual ransomware ...
Known Vulnerabilities Drove Most Cyberattacks in 2022
New research revealed an all-too-familiar theme: Known vulnerabilities for which patches have been issued were the main way threat actors executed cyberattacks in 2022. “The data highlights that long-known vulnerabilities frequently cause ...
CISO Interview Series: The thinking of a CISO at the front end of the cyber threat landscape.
What are the most important areas for a CISO to focus on? When speaking to Aman Sood, it becomes clear that the job of a CISO encompasses every aspect of a business. ...
The Four Pillars of a Cybersecurity Strategy That Works
Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization’s defensive posture is another. Threat intelligence empowers organizations by providing them with the knowledge and ...
Security Challenges for Businesses in 2022
See which challenges should be top of mind for keeping businesses online and growing in the coming months and years. The post Security Challenges for Businesses in 2022 appeared first on Radware ...