Vulnerabilities

6K

Solutions

65

Articles & Videos

8K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Related Topics

  1. Security
  2. Anti-Virus Apps
  3. OS Security
  4. Anti-Spyware
  5. Network Security
  6. Windows XP
  7. Software Firewalls
  8. Encryption
  9. Windows Server 2003
  10. Web Browsers
Refine results

In my experience connecting to a corporate VPN makes my computer a part of another network.  This means that my computer and possibly other computers on my network are now visible to the corporate …

1945 views
Technology Partners: We Want Your Opinion!
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Hi guys

Could you help me with few settings please? how to setup it etc

-      Only computers with the latest updates can login into our network ? via remote access and vpn  ?
-      Should we disable …

44111 views

I don't want to load enhancements or improvements.  Just security patches to avoid any malware, etc.
I was told that https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
is the one …

649 views

hi,

Right now as there are more and more zero day attack and security patch sometime is too slow to apply.

what is the way you guy used to deploy patch asap ? WSUS ? any robust way to do it ?

3158 views

Hi, I got this error when installing patches for MS17-010 and MS14-066. Window Update service is running, the patches is x64, same with Window. I checked CMD -> systeminfo but could not find the …

1166 views

Hi, just looking for a better way of managing WSUS v 6.3.9600.18228
We automatically approve Critical, Definition and Security updates
We sync Critical, Definition, Feature Packs, Security Updates, …

235 views

Dear Adam,

 My client asked me another question after submitting the report to him.

 I am directly quoting his sentence.

 "As for the firmware version upgrade due to critical vulnerabilities …

226 views

We are considering proposals from our current network services provider and a new vendor for future support of our small, 22 user Windows based network. I am concerned that the current provider seems …

27139 views

Could you guys tell me what are the Impacts of a Security Breach on an Organization in Europe ?

657 views

I have read below article.

So if this trojan is very hard to detect actually it can run in my company and  I will never know. Any guides ?


28119 views
Industry Leaders: We Want Your Opinion!
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Dear Experts,

My colleague did the router vulnerabilities and came out with this list?

Is there really a need to upgrade the router firmware?

No.      Bug ID      Description
1      CSCuv07111
IOS and …

750 views

Dear Sir,

I have read through the release notes for my client's Fortigate 100D HA and was suppose to recommend whether do we upgrade the firmware or not.

Can anyone guide me on what factors do I…

453 views

We got an error from Malwarebytes when we ran Ms office 2010:

-Exploit Details-
File: 0
(No malicious items detected)

Exploit: 1
Malware.Exploit.Agent.Generic, , Blocked, [0], [-1],0.0.0

594 views

Hi,

In a question greatly answered by EE, we were advice on using VPN when in our iPhone when are in Public places connecting to Open Wi-Fi's.

What VPN is recommended for someone who has never …

7106 views

We noticed in a hotel we stood at that, the iPhone wifi setting after connecting to the hotels wifi has a warning of "Security  Recommendation" (see below).  



It seems it's a open network since…

18129 views

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the many intricate ways privileged accounts can compromise Active Directory environments.


On the subject of “Tracking and Securing Privileged Users in Active Directory”, Derek Melber, technical evangelist for the ADSolutions team at ManageEngine, outlined that number as Microsoft's own observation.


That’s why companies like ManageEngine are working to educate users and provide simple-to-use tools for protecting the popular Active Directory infrastructure.


0371 views

We run our McAfee Vulnerability Mgr scan against a Windows 2012 R2 & the report
indicated it's a Win 2016 (which I don't know why the wrong OS is given) & it gives 3
vulnerabilities below (which my …

3103 views

There has been patches that were missed & lapses in patching timely for non-Windows
platforms.   I noticed, Wintel was quite up to the mark on patching & I reckon this is
due patch management …

11139 views

There's growing concern on the timeliness & thoroughness of patching.  I need to
broadcast out an email to the organization's hundreds of IT staff (infra & apps teams)
to emphasize this in a firm …

698 views
Automating Your MSP Business
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Hi all,

I am sure that some people have been dealing with this recent security issue regarding disabling SMBv1.

Further details here:

510,310 views

Can anyone recommend the best honey pots esp those that are effective against
APTs & ransomwares?

We are looking at https://canary.tools  : any reviews on this company's honeypot?

790 views

The user self-service tools of SAP HANA contain some vulnerabilities and in order to prevent it , we have to update the systems or desactivate the the self-service tool.

In order to to determine …

2113 views

Hello to everyone,
this question might be easy for most of you but I would like to be notified by email  on every critical Vendor's vulnerabilities found.
Actually I go and check once a week on …

3117 views

Understand  EPO & NIDS can't add SHA256 hashes but we wud still want to mitigate against them.

how can we go about doing this?  So far our EPO could block/prevent creation of certain file

886 views

Hi, we have various power-point files sent to us and wanted to know if there is no malicious code (maybe like VBA) within them.  We have run anti-virus and anti-spam and all ok.  Any other thing we …

12158 views
Show more content
201506-LO-Top-001

Vulnerabilities

6K

Solutions

65

Articles & Videos

8K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Related Topics

  1. Security
  2. Anti-Virus Apps
  3. OS Security
  4. Anti-Spyware
  5. Network Security
  6. Windows XP