Vulnerability Scanning Blog
Read the latest news, developments and opinion pieces on Vulnerability Scanning issues from industry experts New Net Technologies.
The health data belonging to nearly one million New Zealanders has been accessed illegally after a cyber attack on Tū Ora Compass Health's website.
New research shows that vulnerabilities are becoming increasingly more common in our connected devices.
Google's Project Zero security researchers recently revealed that they found several malicious sites that planted malware onto people's iPhones for years.
According to the latest 2019 Mid-Year Vulnerability Report, over 34% (3,3771) of all vulnerabilities reported in the first half of 2019 do not currently have a documented solution.
A security researcher has issued warnings that some airlines that manage booking systems themselves have failed to implement important protect mechanism, exposing sensitive customer data.
The US Coast Guard recently announced that a large international vessel has suffered a cyber attack.
Each year in the US, over 5,000 people are poisoned by eating wild mushrooms. Many cases result in permanent damage to vital organs and in 2016, two fatalities were recorded (source: American Assoc. Poison Control Centers). Many of the victims were actually experienced in the identification of toxic species but still got caught out. The differences between the deadly and the delicious are often subtle.
Security control scans every 30 days leave vulnerability blindspots between scans, Change Control is critical for forensic visibility of changes, automatically distinguishing between planned, & unplanned change.
XP support has ended – How long have you got before your systems are hacked?
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.