An Overview of Significant Vulnerabilities: September 2023
Another busy month for IT-operations and IT-security teams after a number of 0-days in prevalent software.
Another busy month for IT-operations and IT-security teams after a number of 0-days in prevalent software.
The Covid pandemic has encouraged more employees to adopt a remote or hybrid working culture. According to a survey, 59% of European employees were allowed to work from home in the past 2 years. The work-from-home culture will likely stay despite the easing of restrictive measures in Europe. And along with it, growing endpoint security concerns.
The Covid pandemic has encouraged more employees to adopt a remote or hybrid working culture. According to a survey, 59% of European employees were allowed to work from home in the past 2 years. The work-from-home culture will likely stay despite the easing of restrictive measures in Europe. And along with it, growing endpoint security concerns.
Ransomware continues to evolve as cybercriminals resort to newer cunning tactics. But ransomware attacks often result in far more devastating damages than a locked screen. Many managers dread coming to work only to find themselves denied computer access.
NIS2 introduces significant changes, policies, and strategic responses to the European cyber security landscape. Once enacted, member states have up to 21 months to reform their national cybersecurity laws in line with the NIS2. In other words, European companies that fall within NIS2’s provision must prepare themselves for the new reforms by 2024.
A high-risk vulnerability, filed under CVE-2020-3433, allows hijackers to launch DLL attacks after gaining access to the targeted device. A DLL attack involves injecting malicious codes into the DLL files, which the applications will load at run time.
The apps and programs run by your company can expose you to common vulnerabilities that can jeopardize your cyber security. This makes it critical that you understand the common sources of vulnerabilities, preventive measure and perhaps a remediation tool to secure your company.
VulnDetect stored on servers by:
© SECTEER – 2024