patching

Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25
David Lindner, Director, Application Security | | codebase, Conditional Access, Cybersecurity, KEV catalog, MFA, open source, patching, Ransomware, security, Vulnerabilities
Insight No. 1. — Ransomware groups are using CISA’s KEV catalog as a runbook Given that CISA's Known Exploited Vulnerabilities (KEV) catalog highlights the most actively exploited and critical Common Vulnerabilities and ...
Roger Grimes on Prioritizing Cybersecurity Advice
This is a good point: Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists of new projects…lists ...

Legacy Systems: Learning From Past Mistakes
Michael Burch | | Critical National Infrastructure, legacy Software, patching, risk mitigation plan, Software Security, Vulnerability Remediation
Legacy systems are attractive targets to bad actors because outdated components often mean that security vulnerabilities remain unpatched, offering exploitable footholds. “End of life” does not mean “end of vulnerability.” ...
Security Boulevard
The Impact of Live Patching on OpenSSL Security and Best Practices
Rohan Timalsina | | Live Patching Education, Live Patching on OpenSSL, OpenSSL security, OpenSSL Security Best Practices, patching
Live patching allows for updating OpenSSL without system reboots – reducing downtime and maintaining service availability. While live patching improves security by enabling faster updates, careful planning and implementation are crucial. Best ...

Action1 Extends Automated Patching Capability to Groups of Endpoints
Action1 updated its patch management platform to make it possible to dynamically group endpoints and provide an audit trail capability ...
Security Boulevard
Securing Networks: Addressing pfSense Vulnerabilities
Wajahat Raja | | command injection, CVE-2023-42325, CVE-2023-42326, CVE-2023-42327, Cybersecurity, Cybersecurity Best Practices, Cybersecurity News, Digital Threats, firewall, Microsoft Visual Studio Code, mitigation, Netgate, network infrastructure, Network Security, npm integration, Patch Tuesday updates, patching, pfsense, pfSense CE, pfSense Plus, proactive security measures, Remote Code Execution, resolution, responsible disclosure, security risks, Sonar, Vulnerabilities, XSS
In recent findings by Sonar, critical security vulnerabilities have emerged within the widely-used open-source Netgate pfSense firewall solution, potentially exposing susceptible appliances to unauthorized command execution. These pfSense vulnerabilities, comprising two reflected ...
CACTUS Qlik Ransomware: Vulnerabilities Exploited
Wajahat Raja | | Analytics Software, Arctic Wolf, BI Systems, BITS, CACTUS Qlik Ransomware, CVEs, Cyberattack Campaign, Cybersecurity, Cybersecurity News, Data Visualization, Double Extortion, Exploits, HTTP Tunneling, Incident Response, ManageEngine UMES, patching, path traversal, powershell, Qlik Sense, ransomware tactics, Rclone, RDP, Remote Code Execution, Security Vulnerabilities, Sophos Endpoint Security, threat actors, VPN Appliance Flaws, WizTree
A cyberattack campaign dubbed the CACTUS Qlik Ransomware has become prominent in ransomware attacks on BI systems. Researchers have warned of threat actors exploiting three Qlik security vulnerabilities to target different organizations ...
Supermicro IPMI Firmware Vulnerabilities Disclosed
Wajahat Raja | | BMC (Baseboard Management Controller), Cross-Site Scripting (XSS), Cybersecurity, Cybersecurity News, Firmware Vulnerabilities, IPMI, Mitigation Measures, patching, Privilege Escalation, Remote Exploits, Security Flaws, Server Management, Supermicro, Vulnerability Disclosure
A number of security flaws have recently been discovered in Supermicro’s baseboard management controllers (BMCs). These Supermicro IPMI firmware vulnerabilities in the Intelligent Platform Management Interface (IPMI) pose serious dangers, including privilege ...

What You Need to Know About StackRot – CVE-2023-3269
Ofri Ouzan | | CVE-2023-3269, patching, remediation, StackRot, Uncategorized, Vulnerability Management, vulnerability patching
StackRot, identified as CVE-2023-3269 is a 7.8 HIGH use-after-free vulnerability in the Linux kernel versions 6.1 to 6.4 that can lead to privilege escalation. The vulnerability, which was disclosed by Ruihan Li ...

Zyxel Firewall Protection: Patching to Combat Attacks
Riddika Grover | | cyber attacks, Cyber Security, Cyber-attack, Network Security, patching, zyxel firewalls
Introduction Zyxel firewall helps to secure networks against threats and unauthorized access. In today’s world where we share a tremendous amount of data online, network security has become vital. It’s necessary for ...