Vulnerability management empowered by AI

Vulnerability management involves an ongoing cycle of identifying, prioritizing and mitigating vulnerabilities within software applications, networks and computer systems. This proactive strategy is essential for safeguarding an organization’s digital assets and maintaining its security and integrity. To make the process simpler and easier, we need to involve artificial intelligence (AI). Let’s examine how AI is […]

The post Vulnerability management empowered by AI appeared first on Security Intelligence.

Continue reading Vulnerability management empowered by AI

Databases beware: Abusing Microsoft SQL Server with SQLRecon

Over the course of my career, I’ve had the privileged opportunity to peek behind the veil of some of the largest organizations in the world. In my experience, most industry verticals rely on enterprise Windows networks. In fact, I can count on one hand the number of times I have seen a decentralized zero-trust network, […]

The post Databases beware: Abusing Microsoft SQL Server with SQLRecon appeared first on Security Intelligence.

Continue reading Databases beware: Abusing Microsoft SQL Server with SQLRecon

Secure-by-Design: Which Comes First, Code or Security?

For years, developers and IT security teams have been at loggerheads. While developers feel security slows progress, security teams assert that developers sacrifice security priorities in their quest to accelerate production. This disconnect results in flawed software that is vulnerable to attack. While advocates for speed and security clash, consumers must often pay the price […]

The post Secure-by-Design: Which Comes First, Code or Security? appeared first on Security Intelligence.

Continue reading Secure-by-Design: Which Comes First, Code or Security?

New Vulnerability Could Put IoT Devices at Risk

Society relies so heavily on technology that the number of internet connected devices used globally is predicted to grow to 55.9 billion by 2025. Many of these devices span parts of Industrial Control Systems (ICS) that impact the physical world, assist us in our daily lives at home and monitor and automate everything from energy […]

The post New Vulnerability Could Put IoT Devices at Risk appeared first on Security Intelligence.

Continue reading New Vulnerability Could Put IoT Devices at Risk

Vulnerable Powerline Extenders Underline Lax IoT Security

Multiple vulnerabilities have been found in Tenda PA6 Wi-Fi Powerline extender, version 1.0.1.21. This device is part of Tenda’s PH5 Powerline Extender Kit and extends the wireless network through home’s existing electrical circuitry. The kit, in collaboration with X-Force Red, IBM Security’s team of hackers, aligns with the HomePlug AV2 technology and provides wired speeds […]

The post Vulnerable Powerline Extenders Underline Lax IoT Security appeared first on Security Intelligence.

Continue reading Vulnerable Powerline Extenders Underline Lax IoT Security