Categories
Vulnerability

News Alert: Multiple Vulnerabilities Affecting (LANDesk) Ivanti Endpoint Manager Software

JUMPSEC researchers have discovered a series of vulnerabilities in (LANDesk) Ivanti Endpoint Manager, a centralized software solution for administering and monitoring multiple devices in a computer system.  Successful exploitation of these vulnerabilities could allow an attacker to disrupt the functionality of the software e.g. prevent patching leaving endpoints exposed, or move laterally in order to […]

Categories
Jargon Buster Vulnerability

Jargon Buster External & Internal Managed Vulnerability Scanning

Courtney talks about the difference between External & Internal Managed Vulnerability Scanning There is more than one kind of Managed Vulnerability Scanning. In this week’s edition of JUMPSEC’s cyber security Jargon Buster series, Courtney explains the difference between External and Internal Managed Vulnerability Scanning. “External Managed Vulnerability Scanning only targets infrastructure on the public Internet […]

Categories
Vulnerability

Introducing JUMPSEC New Managed Vulnerability Scanning

Introducing JUMPSEC New Managed Vulnerability Scanning Managed Vulnerability Scanning helps you reduce risk from cyber threat by regularly identifying and managing vulnerabilities. It increases visibility and management of discovered vulnerabilities and helps reduce risk to organisations on a continuous basis. To learn more about what Managed Vulnerability Scanning is please take a look at the video […]

Categories
Cyber Security Malware Vulnerability

New ‘DoomsDay Worm’ in the wild

EternalRocks, dubbed the DoomsDay Worm has been identified by Miroslav Stampar (creator of sqlmap). Unlike the much publicised WannaCry, EternalRocks does not contain a kill switch, and incorporates 7 of the exploits developed by the NSA, whereas WannaCry only utilised 2. EternalRocks attempts to masquerade as WannaCry, however it does not encrypt your files – […]

Categories
Cloud Computing Security Vulnerability

VENOM – What does it mean to your business?

Categories
Security Vulnerability

Common weaknesses – Now Visualised

Categories
Encryption Vulnerability

Upgrade OpenSSL Now!

Categories
Security Vulnerability

Invisible, undetectable, effective: hardware trojans are here

Categories
Cyber Security Vulnerability

Happy New Year & look back at 2013!

Categories
Guides Vulnerability

Stacked based mssql blind injection bypass methodology