Best Practices for Network Vulnerability Management

Best practices for vulnerability management really start with the network. By definition, network vulnerability management touches all aspects of your environment, every connected device, operating system, hardware, software, firewalls, and more. An unsecured Wi-Fi router, an IoT device with over permissive access control, or a firewall misconfiguration could be an entry point for an attacker…

Read More

Using the SANS Vulnerability Management Maturity Model in Your Vulnerability Management Process

It is likely that you already have a vulnerability management process in place, but perhaps you’d like to rate the effectiveness of that program and identify areas that you can improve. The SANS Vulnerability Management Maturity Model is a chart that can help you categorize your current program capabilities and develop a roadmap for improvement….

Read More

Automating Vulnerability Management: From Detection to Remediation

In 1999, the year that the CVE database officially began, there were 894 vulnerabilities identified. In 2021, there were 20,150. The number of vulnerabilities discovered each year has skyrocketed in the last few years, making vulnerability management an increasingly daunting task. With no way to remediate every vulnerability in their systems, security teams are focused…

Read More

The Role of Patch Management in Vulnerability Remediation

A vulnerability is a flaw or weakness in a system that, if exploited, would allow a user to gain unauthorized access to conduct an attack. One of the most common types of vulnerabilities is bugs, or vulnerabilities that exist within software such as operating systems or applications. When one of these bugs is discovered after…

Read More

Why Reporting Results of a Vulnerability Assessment is an Essential Step in Your Vulnerability Management Process

A vulnerability assessment is a comprehensive review of your information system, designed to identify weaknesses causing risk for your organization. Vulnerability assessments are essential in order to proactively prevent attacks and stay in compliance with regulatory requirements. The end result of a vulnerability assessment is a report that you can use as a roadmap for…

Read More

New “ABCsoup” Adware Campaign Targeting Russian Users with Malicious Browser Extensions

Context On June 7, 2022, researchers at Zimperium reported technical details of an adware campaign targeting Russian gaming, social media, and ecommerce site users. The campaign uses more than 350 variations of malicious browser extensions using the Google Translate extension ID to trick victims into downloading the malicious files. Researchers named the extension group “ABCsoup.”…

Read More

Best Practices for Application Vulnerability Management

According to F5’s The State of the State of Application Exploits in Security Incidents report, web application attacks were the leading incident pattern among data breaches for six of the last eight years. Meanwhile, the number of new vulnerabilities discovered each year continues to rise, making it difficult for security teams to effectively keep up,…

Read More

Types of Scanning Used in Vulnerability Assessments

In 2021, there were more than 20,000 common vulnerabilities and exposures (CVEs) added to the MITRE database. This number of annually reported vulnerabilities has been gradually climbing since the database’s creation in 1999, with a significant increase in volume over the last five years. As a result, it’s now become impossible for security teams to…

Read More

New AstraLocker Version Phishing Campaign

Context On June 28, 2022, ReversingLABS researchers reported a phishing campaign using malicious Microsoft Office files to distribute the new 2.0 version of the AstraLocker ransomware. Researchers assess that the threat actors behind the campaign likely obtained the AstraLocker 2.0 code from the Babuk leak in September of 2021, based on shared code and campaign…

Read More

Prioritize Remediation with a Risk-Based Approach to Vulnerability Management

A vulnerability is a flaw or weakness in a system that, if exploited, would allow a user to gain unauthorized access to conduct an attack. Vulnerability management is the process of identifying, prioritizing, and remediating these vulnerabilities to reduce an organization’s overall risk. Prioritization of vulnerabilities is essential because not all vulnerabilities are going to…

Read More