You searched for aws/ | SC Media

Your search for aws/ returned 76 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Home remove

Your search for aws/ returned 76 results

Sort Results:

Relevant Recent
Patch Management, Security News, Vulnerabilities

Exploit for critical Windows flaw allows access to admin rights

A Windows vulnerability recently patched by Microsoft, registering a CVSS score of 10, could allow attackers instant access to Active Directory. The vulnerability (CVE-2020-1472) subverts Netlogon cryptography, providing a gateway to an enterprise’s internal network for an intruder to gain Domain Admin status with one click, according to a Secura blog post. “This flaw allows…
Firewalls, IPsec VPNs, Security News, Vulnerabilities

Critical VPN vulnerabilities pose danger to OT networks

The VPN approach for remote security may not be as secure as previously believed, new research has found. That’s particularly troubling, which is especially unfortunate given on the work-at-home reality brought on by COVID-19, according to a blog post from Claroty. Remote code execution (RCE) vulnerabilities affecting VPN implementations primarily used to provide remote access…
Network Security, Security News, Vulnerabilities

Adobe fixes 12 critical bugs in second round of July patches

Just one week after issuing its last batch of patches, Adobe Systems has issued additional security updates fixing 13 vulnerabilities, 12 of them critical out-of-bounds read or write flaws that can lead to arbitrary code execution in either Prelude, Photoshop or Bridge. One additional bug of “important” severity was all located in Mobile Reader, for…

First look: Pulse Secure Software Defined Perimeter

At a GlanceProduct: Pulse Software Defined Perimeter (SDP)Vendor: Pulse SecurePrice: $66 per user, based on 1,000-user purchase. What it does: Uses policies to apply granular application access rights based on the unique combination of a user profile and device type.What we liked: Flexibility and ease of deployment.The Bottom Line: The “zero trust” framework provides a…
Security News

#WatchOut children’s watch vulnerabilities have gotten

More than a year after announcing the #WatchOut vulnerabilities in Gator brand children’s smartwatches, researchers revisited the platform and found even greater vulnerabilities in Gator and other children’s smartwatch manufacturers. While the initial vulnerabilities spotted in October 2017 allowed unauthorized access, remote audio surveillance, location spoofing, and SOS compromise, recent tests conducted by the Pen…
Security News, Vulnerabilities

Children’s smartwatches once again found vulnerable

China-based company MiSafe is once again making headlines with its unsecured products after a pen tester found that its child tracking smartwatches were found to be highly insecure. MiSafe previously made controversy after firm’s Mi-Cam baby monitors were found to be susceptible to unauthenticated access and hijacking of arbitrary baby monitors. Pen Test Partners researchers…
Election Coverage, Government/Defense, Network Security, Security News, States of Security

State of security: Washington

Who’s in Charge: Secretary of State Kim Wyman, Director of Elections Lori Augino In March 2018, Washington State Governor Jay Inslee signed into law House Bill 2406, which aims to improve election security by mandating the adoption of recognized best auditing practices, requiring voting system vendors to disclose data breaches, and authorizing the secretary of state to…

June 2018 Group Test: Vulnerability management tools

This month we take a look at the vulnerability management tools, one of the often-overlooked basics in your security posture. The main takeaway from WannaCry, Petya and others was that patch management is vital to your organization.
Next post in Reviews