Most critical vulnerabilities you need to fix right now.
| | | A List of Highly Critical Vulnerabilities Disclosed in Q1 and Q2 of 2021 | | | | Vulnerabilities are the most exploited security risks that lead to malware and ransomware attacks. They are constantly rising in number and pose high security risks to organizations. Our security research team at SecPod have analyzed all vulnerabilities disclosed in the first half of 2021 and prepared a report. The vulnerabilities were triaged based on multiple factors like ease of exploit, PoC availability, exploit activity, and several others. Get to know what to fix first, curb IT risks, maintain a strong and healthy security posture. | | Download Report | | | | | Recap of Security Updates in August | | |  | | Microsoft August 2021 Patch Tuesday Addresses 44 CVEs Including 3 Zero-Days | | One zero-day is being actively exploited, 37 rated as Important, 7 rated as Critical in Office suite, Browser, Windows, and more. Read More | |  | Cisco Patches Critical and High Severity Flaws in Its VPN Routers | | One Critical, two High-severity flaws. A remote attacker could exploit these vulnerabilities to execute arbitrary code. Read More | | |  | | MS Exchange Servers Actively Under Exploitation Via ProxyShell Vulnerabilities | | ProxyShell is the name given to the set of three vulnerabilities existing in MS Exchange servers that allow arbitrary code execution. Read More | |  | Arcadyan-Based Routers and Modems Under Active Exploitation | | Millions of routers are exposed to a security flaw that existed for a decade in home routers with Arcadyan firmware. Read More | | | | | | | Best Reads from SecPod Blog | | | | SanerNow's Extensive Coverage for Top Routinely Exploited Vulnerabilities | | A compilation of CISA's security advisory reporting the routinely exploited vulnerabilities from 2020 until now across enterprises. Read More | | | | Open-Source Vs. Commercial Vulnerability Management Tools: How a Free Tool Carries Hidden Challenges | | Open-source scanners look like an easy win. But are they really? Find out what hidden challenges and limitations they carry. Read More | | | | |
No comments:
Post a Comment