Vulnerability Scanning Blog
Read the latest news, developments and opinion pieces on Vulnerability Scanning issues from industry experts New Net Technologies.
A new vulnerability was recently discovered that could potentially allow attackers to obtain sensitive information from over one billion Wi-Fi-capable devices.
According to CyberMDX, medical devices pose a serious threat to healthcare organizations (HCOs) and are twice as likely as general network devices to be vulnerable to Bluekeep.
Researchers at TrapX Security recently discovered three of the world's largest manufacturers with IoT devices running Windows 7 infected with malware in an alleged supply chain attack.
The health data belonging to nearly one million New Zealanders has been accessed illegally after a cyber attack on Tū Ora Compass Health's website.
New research shows that vulnerabilities are becoming increasingly more common in our connected devices.
According to the latest 2019 Mid-Year Vulnerability Report, over 34% (3,3771) of all vulnerabilities reported in the first half of 2019 do not currently have a documented solution.
A security researcher has issued warnings that some airlines that manage booking systems themselves have failed to implement important protect mechanism, exposing sensitive customer data.
The US Coast Guard recently announced that a large international vessel has suffered a cyber attack.
Each year in the US, over 5,000 people are poisoned by eating wild mushrooms. Many cases result in permanent damage to vital organs and in 2016, two fatalities were recorded (source: American Assoc. Poison Control Centers). Many of the victims were actually experienced in the identification of toxic species but still got caught out. The differences between the deadly and the delicious are often subtle.
Security control scans every 30 days leave vulnerability blindspots between scans, Change Control is critical for forensic visibility of changes, automatically distinguishing between planned, & unplanned change.
XP support has ended – How long have you got before your systems are hacked? All good things must come to an end and, as of 8 April, Microsoft Windows XP has finally been lain to rest in the Microsoft graveyard alongside Windows 2000, NT, 95 and all the other legacy products where development has ceased.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.