Vulnerability Scanning Blog
Read the latest news, developments and opinion pieces on Vulnerability Scanning issues from industry experts New Net Technologies.
A new vulnerability was recently discovered that could potentially allow attackers to obtain sensitive information from over one billion Wi-Fi-capable devices.
According to CyberMDX, medical devices pose a serious threat to healthcare organizations (HCOs) and are twice as likely as general network devices to be vulnerable to Bluekeep.
Researchers at TrapX Security recently discovered three of the world's largest manufacturers with IoT devices running Windows 7 infected with malware in an alleged supply chain attack.
The health data belonging to nearly one million New Zealanders has been accessed illegally after a cyber attack on Tū Ora Compass Health's website.
New research shows that vulnerabilities are becoming increasingly more common in our connected devices.
Google's Project Zero security researchers recently revealed that they found several malicious sites that planted malware onto people's iPhones for years.
According to the latest 2019 Mid-Year Vulnerability Report, over 34% (3,3771) of all vulnerabilities reported in the first half of 2019 do not currently have a documented solution.
A security researcher has issued warnings that some airlines that manage booking systems themselves have failed to implement important protect mechanism, exposing sensitive customer data.
The US Coast Guard recently announced that a large international vessel has suffered a cyber attack.
Each year in the US, over 5,000 people are poisoned by eating wild mushrooms. Many cases result in permanent damage to vital organs and in 2016, two fatalities were recorded (source: American Assoc. Poison Control Centers). Many of the victims were actually experienced in the identification of toxic species but still got caught out. The differences between the deadly and the delicious are often subtle.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.