Study Finds Majority of Port Vulnerabilities are Found in Three Ports

A new study recently conducted by Alert Logic revealed the majority of vulnerabilities in ports are found in just three ports. The Critical Watch Report of 2019 claims that 65% of vulnerabilities found in Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports are linked to SSH (22/TCP), HTTPS (443/TCP), and HTTP (80/TCP). This is followed by RDP/TCP which has been patched numerous times by Microsoft.


Remote Access Vulnerabilities Found in Popular IoT Devices and Routers

New research shows that vulnerabilities are becoming increasingly more common in our connected devices. As 'smart' Internet-connected devices become more prevalent, so does the potential attack surface for cyber-attacks. While it's truly impossible for any Internet-connected device to be 100% secure from exploitation, manufacturers are not even doing the bare minimum to secure these devices by neglecting to include security by design into the development stage.


What is a Vulnerability?

In cyber security, a vulnerability is a weakness which can be exploited by a cyber attack to gain unauthorized access to or perform unauthorized actions on a computer system. Vulnerabilities can allow attackers to run code, access a system's memory, install malware, and steal, destroy or modify sensitive data. To exploit a vulnerability an attacker must be able to connect to the computer system.


34% of Vulnerabilities Reported in First Half of 2019 Remain Unpatched

According to the latest 2019 Mid-Year Vulnerability Report, over 34% (3,3771) of all vulnerabilities reported in the first half of 2019 do not currently have a documented solution. The report by Risk Based Security claims this lack of patch availability is due to lack of information regarding the flaw or due to lack of a patch release.


Real-time Vulnerability Alerting

Here at CloudPassage, we’ve been researching how public data can be used for real-time vulnerability alerting using principles from the United States Tsunami Warning Center. I am excited to announce that we will be presenting and demonstrating initial results from this research at the OWASP Global AppSec 2019 conference in Washington DC. Please join our session on vulnerability alerting and threat intelligence on September 13 at 4:30 pm.


Detectify now checks for File Disclosure in SSL VPNs - Pulse Secure and Fortinet

Pulse Secure and Fortinet have announced advisories detailing a critical vulnerability found that enables an unauthenticated user to conduct file disclosure in SSL VPN. Thanks to Detectify Crowdsource hackers, Detectify checks your website for these vulnerabilities and will alert you if your version of Pulse Secure or Fortinet gateway is affected.


Climbing the Vulnerability Management Mountain: Taking the First Steps Towards Enlightenment

Just as you would map a hike or climb by creating waypoints you plan to hit each day, you must plan your vulnerability management process by creating similar goals. We call these goals Maturity Levels, from ML0 to ML5, as we defined them in the last blog. You have your asset inventory from an open-source tool, asset tracking database or maybe your preferred vulnerability assessment tool. Now it is time to climb to the first waypoint ML0.


SecOps Automation, Vulnerability Remediation, and Black Hat USA 2019

The twenty second year of Black Hat USA is now behind us. As hosts of SaltConf19 ourselves, we are uniquely aware of the effort required to put on a great show and we have a special appreciation for a job well done. The Black Hat events team did a great job and put on a great show, so kudos to the team. This year was the first time SaltStack sponsored the conference. Here are some of the highlights.


How to Build a Mature Vulnerability Management Program

The evolution of the cyber threat landscape highlights the emerging need for organizations to strengthen their ability to identify, analyze and evaluate cyber risks before they evolve into full-fledged security incidents. When it comes to cyber risk mitigation, the terms “patch management” and “vulnerability management” are used as if they are interchangeable.