Microsoft Patches 17-Year-Old Windows Vulnerability with CVE 10.0 Score

Microsoft Patches 17-Year-Old Windows Vulnerability with CVE 10.0 Score

Microsoft patched a serious Windows DNS Server vulnerability with a CVE score of 10.0, and the latest indication is that it hasn’t been used in the wild in any current attacks. Microsoft ...

F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse

In episode 129 for July 13th 2020: Impact of the F5-BIG-IP critical vulnerability, security updates and your WiFi router, and details about new research that shows how billions of compromised credentials are ...
Severe Windows 10 Vulnerabilities Fixed Ahead of Patch Tuesday

Severe Windows 10 Vulnerabilities Fixed Ahead of Patch Tuesday

Microsoft released an out-of-band update for Windows 10 to patch a couple of high-severity vulnerabilities affecting the Windows Codecs Library that would allow attackers to execute arbitrary code. Windows 10 users are ...

Find a PlayStation 4 vulnerability and earn over $50,000

Do you think you have found a vulnerability in the Sony PlayStation 4 or the PlayStation Network? If so, you could be heading towards a sizeable sum of money. That’s because Sony ...

Tripwire Patch Priority Index for June 2020

Tripwire’s June 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, BIND and Oracle. Up first on the Patch Priority Index this month are patches for Microsoft, BIND and Oracle ...
Online Voting Platform in Three U.S. States Vulnerable to Multiple Types of Attacks

Online Voting Platform in Three U.S. States Vulnerable to Multiple Types of Attacks

Security researchers from the Massachusetts Institute of Technology (MIT) and the University of Michigan found numerous security issues and vulnerabilities within Democracy Live’s OmniBallot platform. The COVID-19 pandemic is pushing more states ...

Tripwire Patch Priority Index for May 2020

Tripwire’s May 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Adobe, SaltStack, and VMware. Up first on the patch priority list this month are patches for VMware vCenter Server ...
Most Apps Use Vulnerable Open-Source Libraries, Veracode Research Shows

Most Apps Use Vulnerable Open-Source Libraries, Veracode Research Shows

New research from Veracode found that most applications use open-source libraries that also present vulnerabilities, but the distribution of such libraries depends on the programming languages used. Open-source libraries are ubiquitous, but ...
Sandworm Team Exploiting Vulnerability in Exim Mail Transfer Agent

Sandworm Team Exploiting Vulnerability in Exim Mail Transfer Agent

The U.S. National Security Agency (NSA) warned that the Sandworm team is exploiting a vulnerability that affects Exim Mail Transfer Agent (MTA) software. In a cybersecurity advisory published on May 28, the ...

Why Threat Intelligence is Central to Effective Vulnerability Prioritization

Vulnerability management is a persistent feature of good cybersecurity practice; a routine hygiene to help proactively reduce organizational risk. But vulnerability management is also a somewhat blunt instrument when faced with a ...