Action1 patching cyberattacks JumpCloud patching

Action1 Extends Automated Patching Capability to Groups of Endpoints

Action1 updated its patch management platform to make it possible to dynamically group endpoints and provide an audit trail capability ...
Security Boulevard

Securing Networks: Addressing pfSense Vulnerabilities

In recent findings by Sonar, critical security vulnerabilities have emerged within the widely-used open-source Netgate pfSense firewall solution, potentially exposing susceptible appliances to unauthorized command execution. These pfSense vulnerabilities, comprising two reflected ...

CACTUS Qlik Ransomware: Vulnerabilities Exploited

A cyberattack campaign dubbed the CACTUS Qlik Ransomware has become prominent in ransomware attacks on BI systems. Researchers have warned of threat actors exploiting three Qlik security vulnerabilities to target different organizations ...

Supermicro IPMI Firmware Vulnerabilities Disclosed

A number of security flaws have recently been discovered in Supermicro’s baseboard management controllers (BMCs). These Supermicro IPMI firmware vulnerabilities in the Intelligent Platform Management Interface (IPMI) pose serious dangers, including privilege ...
Learn about the StackRot vulnerability

What You Need to Know About StackRot – CVE-2023-3269

StackRot, identified as CVE-2023-3269 is a 7.8 HIGH use-after-free vulnerability in the Linux kernel versions 6.1 to 6.4 that can lead to privilege escalation. The vulnerability, which was disclosed by Ruihan Li ...
Zyxel Firewall Protection: Patching to Combat Attacks

Zyxel Firewall Protection: Patching to Combat Attacks

Introduction Zyxel firewall helps to secure networks against threats and unauthorized access. In today’s world where we share a tremendous amount of data online, network security has become vital. It’s necessary for ...
SASE network penetration F5

NetOps, Security Pros Overwhelmed by Network Updates 

Network operations and security professionals are overwhelmed by constant updates and need more support from leadership to keep network and security devices updated and backed up. These were among the key results ...
Security Boulevard
Should you install the latest update? Yes, please do

Should you install the latest update? Yes, please do

While updating software, firmware, and devices may seem trivial, it is an important part of maintaining good overall cybersecurity posture. So, odds are you should definitely update to the latest version of ...
ransomware landscape, defenders, cybersecurity ransomware

Unpatched Vulnerabilities Hamper IT Security Efforts

Executive leadership teams are overlooking critical gaps in vulnerability management within organizations, despite a series of high-profile breaches, according to an Action1 survey of 804 IT professionals. The study revealed that, on ...
Security Boulevard

BlackLotus Malware Hijacks Windows Secure Boot Process

Researchers have discovered malware that “can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of Windows.” Dubbed BlackLotus, the ...