Remove Authentication Remove Mobile Remove Passwords Remove Security Defenses
article thumbnail

Weekly Vulnerability Recap – October 30, 2023 – Citrix & Cisco Haunted by Vulnerabilities

eSecurity Planet

The problem: Unpatched Citrix NetScaler ADC and Gateway appliances allow attackers to retrieve authentication session cookies and other information stored in buffers. allow for authentication bypass and gain root access to systems. account”) failed to verify secret tokens received for authentication before making API requests.

article thumbnail

Weekly Vulnerability Recap – August 28, 2023 – Windows, Ivanti, Adobe Hit By Flaws

eSecurity Planet

August 21, 2023 Ivanti finds another vulnerability For the third time in a month, Ivanti’s has reported a vulnerability in a mobile device management platform. The latest — CVE-2023-38035 — affects the Sentry secure mobile gateway, part of Ivanti’s UEM platform and is being exploited as a zero-day.

VPN 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Vulnerability Recap – August 28, 2023 – Windows, Ivanti, Adobe Hit By Flaws

eSecurity Planet

August 21, 2023 Ivanti finds another vulnerability For the third time in a month, Ivanti’s has reported a vulnerability in a mobile device management platform. The latest — CVE-2023-38035 — affects the Sentry secure mobile gateway, part of Ivanti’s UEM platform and is being exploited as a zero-day.

VPN 70
article thumbnail

Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices

Thales Cloud Protection & Licensing

Along those same lines, they should make it easy for anyone to report a potential security issue, and they should always strive to leverage security mistakes as opportunities for learning, not punishment, when they do occur. These guidelines should include the following: Set up a Strong Password Policy. Employ Device Encryption.

article thumbnail

How Secure Is Cloud Storage? Features, Risks, & Protection

eSecurity Planet

Here’s the difference between cloud and local storage in terms of accessibility, distribution, security measures, and more: Cloud Storage Local Storage Data Storage & Accessibility Hosted on remote servers; accessible via third-party APIs and internet connectivity; access anywhere.

Risk 118
article thumbnail

Weekly Vulnerability Recap – August 14, 2023 – Old or New, Vulnerabilities Need Management

eSecurity Planet

While the infotainment system is supposedly firewalled from steering, throttling, and braking, attached devices may not be fully secured against communication via Wi-Fi. Mobile devices connected to the automobile infotainment system may be exposed to RCE attacks seeking to access the device or use it to attack connected networks.

article thumbnail

6 Takeaways From the Changes in OWASP’s Top 10 Vulnerability Ranking

CyberSecurity Insiders

It is now regarded as the most serious web application security risk based on the data contributed to OWASP’s threat intelligence, which shows that 3.81 These details are in line with the notable rise of application security solutions including Runtime Application Self-Protection (RASP). As the name suggests, it is seventh on the list.