Vulnerability Remediation

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities
Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset ...

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

Legacy Systems: Learning From Past Mistakes
Legacy systems are attractive targets to bad actors because outdated components often mean that security vulnerabilities remain unpatched, offering exploitable footholds. “End of life” does not mean “end of vulnerability.” ...
Progress Hotfixes: Rapid Action Against Vulnerabilities
Progress Software has acted quickly to strengthen the security of its software offerings by issuing a number of hotfixes. These Progress hotfixes are intended to address a severe security hole as well ...

Risk-Based Vulnerability Management for Efficient Security
Your vulnerability remediation process needs to be more strategic and with a goal of remediating the severe risks first ...

Security Fixes Released for Node.js
New releases of the popular Node.js JavaScript framework are available to address multiple vulnerabilities. The post Security Fixes Released for Node.js appeared first on Flashpoint ...

Tracking Patch Tuesday Vulnerabilities: May 2023
Patch Tuesday is a recurring monthly event when Microsoft and many other vendors publish vulnerabilities affecting their software. The post Tracking Patch Tuesday Vulnerabilities: May 2023 appeared first on Flashpoint ...

The Threat of Clop Ransomware: How to Stay Safe and Secure
Protect your organization from the re-emerging threat of Clop ransomware. Learn what Clop is, how it works, and how to prevent a potential ransomware attack. The post The Threat of Clop Ransomware: ...

Bitwarden: The Curious (Use-)Case of Password Pilfering
While evaluating the behavior of Bitwarden, a popular password manager browser extension, Flashpoint’s Vulnerability Research team noticed that embedded iframes in a web page were handled in an atypical manner. The post ...