Remove DNS Remove Security Defenses Remove Software
article thumbnail

7 Best Attack Surface Management Software for 2024

eSecurity Planet

per year Tenable Tenable One, an exposure management platform Identifies assets using DNS records, IP addresses, and ASN, and provides over 180 metadata fields Tenable Attack Surface Management, Add-on for Splunk ISO/IEC 27001/27002 $5,290 – $15,076.50

Software 113
article thumbnail

VulnRecap 2/19/2024: News from Microsoft, Zoom, SolarWinds

eSecurity Planet

The problem: Zoom recently patched a flaw that affected three of its Windows-facing software products: Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows. Appliances with affected software must have Anyconnect SSL VPN enabled on whichever interface is exposed to the internet for an attack to occur.

VPN 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prevent DNS Attacks: DNS Security Best Practices

eSecurity Planet

Domain name service (DNS) attacks threaten every internet connection because they can deny, intercept, and hijack connections. With the internet playing an increasing role in business, securing DNS plays a critical role in both operations and security. Everything You Need to Know.

DNS 113
article thumbnail

Vulnerability Recap 10/01/24 – NVIDIA, Ivanti & Newcomer Kia See Issues

eSecurity Planet

Progress Software, which owns WhatsApp Gold, released a security bulletin advising customers to upgrade their WhatsApp Gold instances to version 24.0.1. If the installations use default software configuration, a threat actor could use a specifically crafted container image to access the host file system. of WhatsApp Gold.

article thumbnail

Vulnerability Recap 7/29/24 – Multiple Old Security Flaws Reappear

eSecurity Planet

A Microsoft SmartScreen vulnerability from earlier this year resurfaced, and a Docker flaw from 2018 is still causing issues in a newer version of the software. If you’re part of an IT or security team responsible for handling vulnerabilities, make sure your team has a way to be immediately updated when new issues arise.

Internet 109
article thumbnail

How Cobalt Strike Became a Favorite Tool of Hackers

eSecurity Planet

Pentesting involves vulnerability exploitation and post-exploitation actions – the idea is to conduct a real attack, like cybercriminals would do, except with an explicit authorization from the company in order to identify weaknesses and improve security defenses. Read next: Best SIEM Tools & Software for 2022.

article thumbnail

How To Set Up DMZ on Servers: 7-Step DMZ Configuration

eSecurity Planet

File Transfer Protocol (FTP) servers: Transfer files securely across the internet. Domain Name System (DNS) servers: Translate domain names to IP addresses. Navigate to the control or configuration panel of your specific firewall software and name the DMZ wherever you’re prompted to do so. How Many Firewalls Do You Need?