Home Tags Vulnerability Management

Tag: Vulnerability Management

Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice generally refers to software vulnerabilities in computing systems.

The group behind the VenusLocker ransomware have switched to cryptocurrency mining Monero.
Google moved quickly to kick three fake bitcoin wallet apps from its Google Play marketplace after researchers discovered them earlier this month.
Brazilian firms are the latest targets in a spam campaign delivering CHM help files hiding links to bank Trojans.
The United States government is officially blaming North Korea for the WannaCry ransomware outbreak in May that infected nearly a quarter-million computers in 150 countries.
Google’s Project Zero team dubs a new WPAD-related attack as an “aPAColypse Now” that allows a local attacker to compromise a targeted and fully patched Windows 10 PC.
Researchers warn hundreds of Lexmark printers are vulnerable to a trivial hack thanks to user “gross negligence.”
Malware intended for a “high-impact” attack against safety systems likely would of caused physical damage to a targeted company located in the Middle East.
Synaptics said reports that hundreds of HP laptops contained a secret keylogger that traced back to debugger software made by the company are inaccurate.
A permissions flaw in Microsoft’s Azure AD Connect software could allow a rogue admin to escalate account privileges and gain unauthorized universal access within a company’s internal network. 
New research shows how an old vulnerability called ROBOT can be exploited using an adaptive chosen-ciphertext attack to reveal the plaintext for a given TLS session.
Microsoft patched 34 vulnerabilities in all on Tuesday with most of the bugs impacting Microsoft Edge, Microsoft Office and Microsoft’s Scripting Engine.
On December 12, 2017, a research paper with the title Return of Bleichenbacher's Oracle Threat was made publicly available.

This paper describes how some Transport Layer Security (TLS) stacks are vulnerable to variations of the classic Bleichenbac...