Vulnerability Scanning Blog
Read the latest news, developments and opinion pieces on Vulnerability Scanning issues from industry experts New Net Technologies.
A new vulnerability was recently discovered that could potentially allow attackers to obtain sensitive information from over one billion Wi-Fi-capable devices.
According to CyberMDX, medical devices pose a serious threat to healthcare organizations (HCOs) and are twice as likely as general network devices to be vulnerable to Bluekeep.
Researchers at TrapX Security recently discovered three of the world's largest manufacturers with IoT devices running Windows 7 infected with malware in an alleged supply chain attack.
The health data belonging to nearly one million New Zealanders has been accessed illegally after a cyber attack on Tū Ora Compass Health's website.
New research shows that vulnerabilities are becoming increasingly more common in our connected devices.
Google's Project Zero security researchers recently revealed that they found several malicious sites that planted malware onto people's iPhones for years.
According to the latest 2019 Mid-Year Vulnerability Report, over 34% (3,3771) of all vulnerabilities reported in the first half of 2019 do not currently have a documented solution.
A security researcher has issued warnings that some airlines that manage booking systems themselves have failed to implement important protect mechanism, exposing sensitive customer data.
The US Coast Guard recently announced that a large international vessel has suffered a cyber attack.
Each year in the US, over 5,000 people are poisoned by eating wild mushrooms. Many cases result in permanent damage to vital organs and in 2016, two fatalities were recorded (source: American Assoc. Poison Control Centers). Many of the victims were actually experienced in the identification of toxic species but still got caught out. The differences between the deadly and the delicious are often subtle.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.