Please turn on your JavaScript for this page to function normally.
PremiSys
Widely used building access system can be easily compromised

A researcher has discovered several egregious vulnerabilities in the PremiSys IDenticard building access management system, some of which could allow attackers to take control …

bomb
Most organizations suffered a business-disrupting cyber event

A study conducted by Ponemon Institute found that 60 percent of organizations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks …

Tenable.io available on AWS Marketplace

Tenable unveiled that Tenable.io, for vulnerability management in the cloud, is available for purchase on Amazon Web Services (AWS) Marketplace. This allows customers to build …

router
MikroTik routers with default credentials can be easily compromised

If you own a MikroTik router and you haven’t updated its RouterOS in the last month, you should do so now: Tenable Research has released details about four …

TL-WR841N
Popular TP-Link wireless home router open to remote hijacking

By concatenating a known improper authentication flaw with a newly discovered CSRF vulnerability, remote unauthenticated attackers can obtain full control over TP-Link …

Advantech WebAccess
Advantech WebAccess RCE flaw still exploitable, exploit code available

A vulnerability in Advantech WebAccess, a web browser-based software package for human-machine interfaces (HMI) and supervisory control and data acquisition (SCADA) systems, …

strategy
There’s a global divide in how organizations assess cyber risk

Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and …

risk
Quantifying cyber exposure: Attackers are racing ahead

Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …

point
New infosec products of the week​: February 3, 2017

New approach to continuous Docker container security NeuVector’s solution for container security is itself a container. The application automatically learns and whitelists …

Don't miss

Cybersecurity news