CVE
Akamai and Snyk Partnership Creates a Powerful Combination for In-Browser Script Protection
A web experience begins with the sum of the code you created. But it also includes all the code the user is put in contact with when loading your website. This means ...
The RECON Vulnerability and related TTPs
Key takeaways CVE-2020-6287 is a vulnerability present in SAP NetWeaver software that hinges on a missing authentication check. Successful weaponization of this vulnerability would allow attackers to abuse internet-facing SAP systems in ...
The History of Common Vulnerabilities and Exposures (CVE)
During the late 1990s, security professionals were using information assurance tools in concert with vulnerability scanners to detect and remove vulnerabilities from the systems for which they are responsible. There’s just one ...
Severe TeamViewer Vulnerability Let Attackers Steal System Password
A security researcher found a severe TeamViewer vulnerability affecting Windows versions of the application 8 through 15, allowing attackers to steal system credentials. TeamViewer is a powerful tool for remote administration, but ...
Severe Windows 10 Vulnerabilities Fixed Ahead of Patch Tuesday
Microsoft released an out-of-band update for Windows 10 to patch a couple of high-severity vulnerabilities affecting the Windows Codecs Library that would allow attackers to execute arbitrary code. Windows 10 users are ...
U.S Government Lists CVEs Most Exploited by Foreign Cyber Adversaries
A joint report from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and the broader U.S. government offers information about the commonly known vulnerabilities exploited by sophisticated ...
NVIDIA Fixes High-Severity Vulnerability in Drivers
NVIDIA released a security update for its drivers, fixing several issues that could lead to denial of service, escalation of privileges, or information disclosure. The update covers multiple vulnerabilities affecting both the ...
Emotet attacks— a spike to start the year…
The Emotet malware is a very destructive banking Trojan that was first identified in 2014. Over the years it has evolved with new capabilities and functionalities, prompting cybersecurity agencies like the Australian ...
IE and FIREFOX-Patching nightmare begins in 2020…
Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world ...
25 Most Dangerous Software Errors List Shows SQL Injections Dropping in Frequency
The top 25 most dangerous errors found in the CVE repositories were just published, and they show some interesting and surprising trends over the past decade. The first place in the Top ...

