What Is Vulnerability Management? Definition, Process Steps, Benefits and More

Vulnerability management is a cybersecurity strategy that enables organizations to identify, prioritize and mitigate security risks across their IT environmentRead More The post What Is Vulnerability Management? Definition, Process Steps, Benefits and ...
What Is Vulnerability Management?

What Is Vulnerability Management?

Vulnerability management is a process that enables organizations to identify, assess and prioritize security risks across their IT systems andRead More The post What Is Vulnerability Management? appeared first on Kaseya ...
What Is Vulnerability Management?

What Is Vulnerability Management?

Vulnerability management is a process that enables organizations to identify, assess and prioritize security risks across their IT systems andRead More The post What Is Vulnerability Management? appeared first on Kaseya ...
Microsoft Patch Tuesday busts ‘NSACrypt’ vulnerability in Windows OS

Microsoft Patch Tuesday busts ‘NSACrypt’ vulnerability in Windows OS

The Cybersecurity Advisory of the National Security Agency (NSA) has recently uncovered a critical Windows CryptoAPI Spoofing Vulnerability in Windows 10 operating systems. Dubbed NSACrypt, the security flaw found in the Crypt32.dll ...

Toughen Up Your AD

Request for Comments (RFC) 1823 from August 1995 introduced the Lightweight Directory Access Protocol (LDAP) Application Programming Interface (API). One could argue that this important work served as the foundation for modern ...
Why Most Organizations Still Can’t Defend against DCShadow – Part 2

Why Most Organizations Still Can’t Defend against DCShadow – Part 2

In part 1 of this blog post, I talked about the threat that DCShadow poses to organizations that use Microsoft Active Directory (AD). Here in part 2, I’ll talk about steps you ...
DCShadow Blog - Adding Domain Admin SID

Why Most Organizations Still Can’t Defend against DCShadow

DCShadow is a readily available technique that allows an attacker to establish persistent privileged access in Active Directory (AD). Specifically, DCShadow allows an attacker with privileged access to create and edit arbitrary ...

NSA sounds the alarm on BlueKeep: Windows vulnerability opens the door for the next WannaCry

It’s been just over two years since WannaCry, the ransomware that exploited the EternalBlue vulnerability to infect hundreds of thousands of computers around the world and inflict an estimated $8B in damages ...
hackers

Wi-Fi Chip Firmware Flaws Enable Over-the-Air Hacking

Editor’s Note: This post was updated Jan. 29 to include a statement from Marvell Wi-Fi chips used in several gaming consoles, Chromebooks, streaming boxes, routers and other types of devices have several ...
Security Boulevard
Windows VCF Zero-Day Exploit Allows Remote Code Execution

Windows VCF Zero-Day Exploit Allows Remote Code Execution

A new unpatched vulnerability in Windows has been disclosed along with proof-of-concept exploit code. It could allow hackers to more easily install malware on computers, but it requires user interaction. The vulnerability ...
Security Boulevard