Take a Bite Out of Sweyn

If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” But how serious is SweynTooth, and what should hospitals be doing to minimize risk?

The post Take a Bite Out of Sweyn appeared first on Security Intelligence.

Continue reading Take a Bite Out of Sweyn

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.

The post Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers appeared first on Security Intelligence.

Continue reading Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

To Rank or Not to Rank Should Never Be a Question

Scanning is an important part of any vulnerability management program, but it should always be accompanied by vulnerability ranking to ensure teams are patching the most impactful issues first.

The post To Rank or Not to Rank Should Never Be a Question appeared first on Security Intelligence.

Continue reading To Rank or Not to Rank Should Never Be a Question

TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover

If exploited, this router vulnerability can allow a remote attacker to take control of the router’s configuration without authentication, putting personal and business data at risk.

The post TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover appeared first on Security Intelligence.

Continue reading TP-Link Archer Router Vulnerability Voids Admin Password, Can Allow Remote Takeover

Why Fixing Security Vulnerabilities Is Not That Simple

When it comes to patching, the devil is in the details. Help the process along by understanding these five issues organizations commonly face between scanning and finding security vulnerabilities.

The post Why Fixing Security Vulnerabilities Is Not That Simple appeared first on Security Intelligence.

Continue reading Why Fixing Security Vulnerabilities Is Not That Simple

The Art of Patch Management

Reading Time: 4 minutes The vagaries of systems and organizations, compounded by the irrationality of the human mind and variations in patches themselves, means that patch management is not an exact science — it’s an art.

The post The Art of Patch Management appeared first on Security Intelligence.

Continue reading The Art of Patch Management

Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Researchers published two pieces of exploit code that can allow anyone to interact with an organization’s SAP enterprise resource planning platform and perform unauthorized transactions.

The post Published Exploits for Accessing SAP Systems Put Security Teams on Alert appeared first on Security Intelligence.

Continue reading Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Penetration Testing Versus Red Teaming: Clearing the Confusion

There is some confusion in cybersecurity as to the difference between penetration testing and red teaming. Since all businesses have vastly different security needs, the distinction is critical.

The post Penetration Testing Versus Red Teaming: Clearing the Confusion appeared first on Security Intelligence.

Continue reading Penetration Testing Versus Red Teaming: Clearing the Confusion

Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control

IBM X-Force found a zero-day buffer overflow vulnerability in one of the most common routers on the market that could let malicious third parties take control of the device from a remote location.

The post Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control appeared first on Security Intelligence.

Continue reading Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control

Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.

The post Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems appeared first on Security Intelligence.

Continue reading Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems