Author: DEFENDEDGE
-
SAP Bugs Under Active Cyberattack, Causing Widespread Compromise
Cyberattackers are actively exploiting known security vulnerabilities in widely deployed, mission-critical SAP applications, allowing for full takeover and the ability to infest an organization further. Read more
-
Malicious Cyber Activity Targeting Critical SAP Applications
Original release date: April 6, 2021 SAP systems running outdated or misconfigured software are exposed to increased risks of malicious attacks. SAP applications help organizations manage critical business processes—such as enterprise resource planning, product lifecycle management, customer relationship management, and supply chain management. On April 6 2021, security researchers from Onapsis, in coordination with… Read more
-
Apple Mail Zero-Click Security Vulnerability Allows Email Snooping
The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two .ZIP files attached. Read more
-
How To Defend the Extended Network Against Web Risks
Aamir Lakhani, cybersecurity researcher for Fortinet’s FortiGuard Labs, discusses criminals flocking to web server and browser attacks, and what to do about it. Read more
-
Vulnerability Summary for the Week of March 29, 2021
Original release date: April 5, 2021 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info arubanetworks — instant A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 and below; Aruba Instant… Read more
-
15 Cybersecurity Pitfalls and Fixes for SMBs
In this roundtable, security experts focus on smaller businesses offer real-world advice for actionable ways to shore up defenses using fewer resources. Read more
-
FBI: APTs Actively Exploiting Fortinet VPN Security Holes
Three security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon. Read more
-
80% of Global Enterprises Report Firmware Cyberattacks
A vast majority of companies in a global survey from Microsoft report being a victim of a firmware-focused cyberattack, but defense spending lags, but defense spending lags. Read more
-
Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack
Some legacy models of QNAP network attached storage devices are vulnerable to remote unauthenticated attacks because of two unpatched vulnerabilities. Read more
-
Building a Fortress: 3 Key Strategies for Optimized IT Security
Chris Hass, director of information security and research at Automox, discusses how to shore up cybersecurity defenses and what to prioritize. Read more