article thumbnail

Dell new vulnerability puts over 30 million users at risk

CyberSecurity Insiders

Eclypsium, a Cybersecurity vendor, was the first to discover these vulnerabilities in over 129 Dell Models that allowed cybercriminals to execute arbitrary code inside the machine BIOS. Note 1- To mitigate cyber risks, Dell is asking its users to update to the latest Dell Client BIOS version ASAP.

Risk 87
article thumbnail

Top 9 Cybersecurity Challenges SMEs Currently Face

Responsible Cyber

Small and mid-sized enterprises (SMEs) are increasingly at risk of cyber-attacks, and often serve as a launch pad for larger threat campaigns, according to Cisco’s 2018 SMB Cybersecurity Report. Humans remain the biggest and most common cybersecurity threat to businesses of all sizes. SQL Injection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Reducing your attack surface is more effective than playing patch-a-mole

Malwarebytes

On June 13, 2023 the Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive (BOD) 23-02. Zyxel warned its NAS (Network Attached Storage) devices users to update their firmware to fix a critical severity command injection vulnerability.

article thumbnail

Why Healthcare IoT Requires Strong Machine Identity Management

Security Boulevard

These devices, if left unsecured, can expose an organization to several different risks and potential compromises. Securing and protecting your healthcare organization against the risks of IoT devices requires a mix of fundamental cybersecurity practices and targeted efforts. Weak PKI Implementation is a Major Cyber Risk.

article thumbnail

GrammaTech CodeSentry Enhances Software Bill of Materials Capabilities to Improve Software Supply Chain Security

CyberSecurity Insiders

“CodeSentry provides deep visibility, intelligence and actionable information into the makeup of software applications and their vulnerabilities without access to source code so enterprises, development teams and software vendors can better identify and reduce cyber risk.”. printer drivers, router firmware, etc.),

article thumbnail

11 Key Steps of the Patch Management Process

eSecurity Planet

Installing these patches and updates keeps your software and firmware secure, reliable, and up to date with the latest improvements. This step-by-step guide to the patch management process can help you stay ahead of vulnerabilities and reduce cyber risk.

article thumbnail

Cyber Threats to the FIFA World Cup Qatar 2022

Digital Shadows

The answer to this question—one asked on a daily basis about the wildest array of threats—is quite simple and involves taking a risk-based approach to these issues. Implementing simple cyber hygiene strategies can go a long way in preventing cyber risks for your organization.