Today’s Microsoft Security Update addressed 130 vulnerabilities, including 9 that are rated as Critical. This is double the number fixed from last month, June 2023. Microsoft included two security advisories this month, ADV230001 and ADV230002.The ADV230001 security advisory addresses some drivers that were certified by the Microsoft’s Windows Hardware Developer Program (MWHDP) that have been used […]
CTA Type: Blog
BeSTORM Release 13.1.0
Enhancements At Beyond Security, we continually strive to improve our products with updates and enhancements that are often customer driven. Below are the enhancements from our latest beSTORM release: *NOTE: If your projects use these modules, substitute them with the IEEE802.11 (Subscriber – Simple), CG4579 (Over PCAN), and Running Speed and Cadence modules. Contact Us […]
Frontline VM Release 6.5.4
As part of the Infrastructure Protection Fortra family, Frontline VM and BeSECURE are a tandem solution. Each release helps update and pave the way for additional vulnerability management features and improvements. Based off of user feedback, here are the recent updates for Frontline VM. Linux Agent Scan Linux assets that are not always connected to […]
Vintage Vulnerabilities: New Attacks Can Exploit Old Weaknesses
Popular entertainment would have us believe that hackers are all sophisticated attackers ready to strike the latest vulnerabilities. That is sometimes true, but it’s become increasingly apparent that whether it’s the latest zero-day bug or something that was discovered the same year Apple released the iPad, hackers are equal-opportunity offenders. “Classic” Vulnerabilities Cybersecurity professionals know […]
Read More… from Vintage Vulnerabilities: New Attacks Can Exploit Old Weaknesses
Video: A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
After years of growing in importance, cybersecurity took center stage in 2022, with cyberattacks not only continuing to cause global disturbances, but also becoming the focus of legislation, organizational planning, news coverage, and even major plot points on tv. Amidst the flurry of activity, common themes have emerged regarding cyber threats and the way respond […]
Read More… from Video: A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
What is a Supply Chain Attack and How Can Organizations Defend Against Them?
Supply chain attacks were responsible for 62% of system intrusion incidents, according to Verizon’s 2022 Data Breach Investigations Report. This type of attack is one of the most effective ways to compromise organizations because it targets the weakest link in the security chain. Supply chain attacks usually begin by compromising a supply chain partner, such as […]
Read More… from What is a Supply Chain Attack and How Can Organizations Defend Against Them?
What is the Relationship Between Ransomware and Phishing?
Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed. However, ransomware operators are increasingly leveraging phishing tactics to deploy their malicious payloads, and the potential for compromise is exponentiating as a result. Ransomware and Phishing – a match made in heaven Phishing is the number one delivery vehicle for ransomware, states risk management firm Deloitte. Industry sources agree, and […]
Read More… from What is the Relationship Between Ransomware and Phishing?
A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
In 2022, geopolitical unrest and an expanding online attack surface contributed to the emergence of several themes across the cyber landscape. Infrastructures associated with opposing ideologies were highly targeted, with government agencies, supply chains, and IOT devices falling victim to high-profile campaigns. Cybercriminals launched increasingly advanced attacks on vulnerable entities, with DDoS, ransomware, and hacking […]
Read More… from A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
Why Is Black Box Fuzzing Important in Key Industries?
Black Box Fuzzers Black box fuzzers attack code vulnerabilities the same way a real-world cybercriminal would so you can find code weaknesses before they are exploited. A form of dynamic application security testing (DAST), this tool attacks from outside the application code, using a wide range of malformed or partial code data injections to find unexpected code input […]
Read More… from Why Is Black Box Fuzzing Important in Key Industries?
The Next Generation Of beSECURE Is Here
Introducing the All New beSECURE Platform The newest version of beSECURE has rolled out. This version is packed with updated and innovative features. This new version strengthens your ability to analyze, prioritize, and simplify vulnerability management. And the best feature, there’s no additional cost. Meet the new features: Get a 5-Minute Guided Tour Take a quick, step-by-step […]