Get a Pentest and security assessment of your IT network.

Cyber Security

Vulnerable perimeter devices: a huge attack surface

Digital threat management company RiskIQ found hundreds of thousands of fringe network or remote access solutions from Cisco, Microsoft, Citrix, or IBM, where high and critical severity security vulnerabilities were discovered. The researchers say monitoring these new assets and the issues they re vulnerable to requires a new type of technology that looks at an organization s digital presence from the outside-in Even if fixes are available, attackers will keep scanning for vulnerable targets because they know that companies have a time to patch that represents a window of opportunity.

Source: https://www.bleepingcomputer.com/news/security/vulnerable-perimeter-devices-a-huge-attack-surface/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security