Category: News
Automatically Discover, Prioritize and Remediate Windows DNS Vulnerability (CVE-2020-1350) Using Qualys VMDR®
On July 14, 2020, Microsoft issued a new security advisory on Microsoft Windows Patch Day – addressing CVE-2020-1350, also known as SigRed – a remote code execution vulnerability in Windows Domain Name System (DNS) servers. The […]Create Strong Passwords with a Password Generator
To effectively protect your accounts from being hacked, it’s important that you have a strong password with each account that you create. However, it can be difficult to think of […]9.0 Release for the Network Security Product Portfolio
FireEye is excited to announce the release of version 9.0 for our Network Security product portfolio that includes Network Security (NX), Central Manager (CM), Malware Analysis (AX), File Protect (FX) […]How information governance helps reduce IT budgets
A volatile economy and massive disruptions to business models have many IT planners scrambling to allocate budget and keep up with the changes. At the same time, they’re also realizing […]Future of Work Survey 2020 | How Companies are Planning for ‘Work from Anywhere’ | Riverbed
As the “new normal” becomes just normal, companies are preparing for a large-scale, long-term shift to remote work, where increasingly employees will ‘work from anywhere.’ Although we all wish the […]capa: Automatically Identify Malware Capabilities
capa is the FLARE team’s newest open-source tool for analyzing malicious programs. Our tool provides a framework for the community to encode, recognize, and share behaviors that we’ve seen in […]New Indeed CM 6.2 release shapes the future of PKI
We have added a number of new functionalities to the Indeed CM software since the last release. The brand new features include the introduction of the “Dashboard” section and the […]Tax Day Fraud: “Identity Theft Subscriptions” in High Demand on the Dark Web
With billions of stolen usernames, passwords, banking information and more circulating on the dark web, identity theft is an evolving and lucrative business, one notorious for exploiting vulnerable times and […]SCANdalous! (External Detection Using Network Scan Data and Automation)
Real Quick In case you’re thrown by that fantastic title, our lawyers made us change the name of this project so we wouldn’t get sued. SCANdalous—a.k.a. Scannah Montana a.k.a. Scanny […]Mutation Cross-Site Scripting (mXSS) Vulnerabilities Discovered in Mozilla-Bleach
According to documentation, “Bleach is an allowed-list-based HTML sanitizing library that escapes or strips markup and attributes and is intended for sanitizing text from untrusted sources.” In simpler terms, Bleach […]Load More