March 7, 2017 Widespread Bug Bounty Program Could Help Harden Open Source Security 2 min read - As part of HackerOne's effort to improve open source security, the vulnerability disclosure firm made its bug bounty program available for free.
March 7, 2017 Wireshark Squashes Bugs With New Network Protocol Analyzer Update 2 min read - The Wireshark development team addressed dozens of vulnerabilities, segmentation flaws and bugs with the latest version of its network protocol analyzer.
March 6, 2017 DblTek GoIP GSM Gateways Have a Backdoor Password 2 min read - DblTek GSM gateways have a hidden backdoor password that allows root shell access. How can users protect themselves from this vulnerability?
Software Vulnerabilities March 6, 2017 Cheap Shock: Why Shellshock Is Still a Thing 2 min read - Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.
February 27, 2017 Linux Update Fixes 11-Year-Old Flaw 2 min read - A recent Linux update patched a vulnerability that enabled fraudsters to use heap spraying methods to execute arbitrary code and escalate permissions.
Application Security February 9, 2017 SAP HANA Security Evolution, From SPS08 to Now 3 min read - The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
February 9, 2017 Mind the Gap: Closing Vulnerability Management Exposure With IBM BigFix and QRadar Vulnerability Manager (QVM) < 1 min read - IBM BigFix and QRadar Vulnerability Manager (QVM) can help security professionals close the vulnerability management exposure gap and prevent breaches.
February 6, 2017 Beyond Virtual: Vulnerability Testing Tools Now Hack Hardware 2 min read - A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
Endpoint December 8, 2016 How to Find and Remediate Vulnerabilities in Real Time 2 min read - IT managers should take advantage of the many resources available to help them monitor, manage and ultimately remediate vulnerabilities.
Risk Management November 1, 2016 Vulnerability Management: Do You Know Your Risks? 2 min read - Vulnerability management is a critical part of any security program, but many IT professionals fail to realize that it starts with risk management.