Blog

Blog

Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability

Microsoft Exchange Server Remote Code Execution (RCE) VulnerabilityOn Tuesday, March 2nd, Microsoft released an out-of-band security update to mitigate four zero-day vulnerabilities that were observed being exploited in the wild against Microsoft Exchange Servers. A server-side request forgery (SSRF) being tracked as CVE-2021-26855 is the likely initial access for attackers. Exploitation of this...
Vulnerability Research

NETSHIELD Corporation Nano 25 Vulnerability

We are disclosing a vulnerability identified in NETSHIELD Corporation Nano 25. The engineers at NETSHIELD Corporation were prompt in their response when notified of the flaw and have provided a patch for the cyber security issue.NETSHIELD Corporation has released a patch for the affected Nano 25 version 10.2.18.Fortra VM will not include an explicit check for this vulnerability due to the...
Vulnerability Research

Microsoft Defender Zero-Day Remote Code Execution (RCE) Vulnerability

Microsoft Defender Zero-Day Remote Code Execution (RCE) VulnerabilityOn Tuesday, January 12th, Microsoft released a patch for an RCE vulnerability present within their antivirus solutions, Windows Defender, System Center Endpoint Protection, and Security Essentials. his vulnerability is being tracked as CVE-2021-1647. Although an exploit has not been publicly released, this vulnerability is...
Blog

Win at Remediation with Quality over Quantity

Win at Remediation with Quality over Quantity VM plan Managing Vulnerabilities Effectively Requires a Quality Over Quantity MindsetBusiness networks will always play host to a number of vulnerabilities. Factor in the current proliferation of endpoints and growing network complexity and you have a list of vulnerabilities that is growing exponentially. The number of reported vulnerabilities has...
Blog

Palo Alto Networks Cortex XSOAR: Prioritizing and Accelerating Remediation of Systems

Vulnerability management and threat assessment solutions provide the first line of defense in protecting assets across an organization, yet today’s widely deployed solutions are outdated in terms of providing an accurate real-time assessment of today’s complex hybrid-cloud environments. In addition, the majority of legacy solutions fail to prioritize the remediation of risky assets or even assets...
Blog

Zyxel Hardcoded Backdoor Account Vulnerability

Zyxel Hardcoded Backdoor Account VulnerabilityOn December 23rd, 2020, the Dutch security firm Eye disclosed a hardcoded backdoor account within the firmware 4.60 on Zyxel Firewalls and AP Controllers. The credentials for this account cannot be changed or altered unless the firmware is patched. These hardcoded credentials provide access to both SSH and web admin interfaces, where additional...
Blog

What is Vulnerability Scanning and How Does it Work?

Businesses of all sizes have some form of data that a threat actor could exploit. It is even possible for a cyber-criminal to invade a company's available network with the sole purpose of causing web security testing issues. Whether it involves patient medical histories, credit card data, available consumer transaction histories, or trade secrets, if a company uses technology to transmit or store...
Blog

Internal vs. External Vulnerability Scans

As a merchant, you are likely familiar with the strict Payment Card Industry Data Security Standard (PCI DSS) requirements set by the PCI Security Standards Council (SSC). Failure to adhere to PCI compliance standards creates vulnerabilities within your business’s network that could result in a loss of sensitive credit cardholder data from consumers and malicious intrusion into your business...
Vulnerability Research

Advisory for SolarWinds Orion Vulnerabilities

Advisory Solarwinds Orion Vulnerabilities Security Advisory: SolarWinds OrionAs you have likely seen in news reports over the last weeks, a series of significant security incidents occurred in earlier this month related to malicious cyber actors exploiting VMware® Access and VMware Identity Manager products and a security breach at FireEye uncovering injected malware within SolarWinds network...
Blog

What is Security as a Service? (SECaaS or SaaS)

Businesses are becoming increasingly vulnerable to digital threats and cyber attacks. While you might be aware of the need for security services, developing your in-house solution is often costly, time-consuming, and potentially ineffective against evolving threats.One solution is Security as a Service (SECaaS), which follows the software as a service model. In this type of security management, an...
Blog

SolarWinds Orion Supply Chain (SUNBURST) Backdoor

SolarWinds Orion Supply Chain (SUNBURST) Backdoor VulnerabilitySolarWinds Orion Supply Chain (SUNBURST) BackdoorOn December 13th, the security firm FireEye released the details of a sophisticated manual supply chain attack that affects SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 (with no hotfix installed) or 2020.2 HF 1. The threat actors involved were able to incorporate a malicious ...
Blog

Vulnerability Management: What is It? Process, Best Practices

These days, data breaches within organizations occur so often that they are an expected inevitability. Threat actors are always seeking ways to infiltrate a system to exploit it for personal gain, whether to release sensitive information like trade secrets or slow a company down to a crawl by taking over its network. A business's IT department and security team can prevent this issue with an...
Vulnerability Research

Advisory for D-Link VPN Router Vulnerabilities

D-Link VPN Router VulnerabilitiesDigital Defense, Inc. is disclosing vulnerabilities identified in D-Link VPN routers discovered by our Vulnerability Research Team (VRT). The engineers at D-Link were prompt in their response when notified of the flaws and have provided hot fixes for these cyber security issues.D-Link has made a patch in the form of a hotfix for the affected firmware versions and...
Vulnerability Research

Drupal Arbitrary PHP Code Execution Vulnerability

Drupal Arbitrary PHP Code Execution VulnerabilityOn November 16th, 2020, several file manipulation vulnerabilities within the PEAR Archive_Tar library were disclosed, given CVE-2020-28948 and CVE-2020-28949. This PEAR library is used by Drupal, although these vulnerabilities impact any platform that utilizes PEAR in their code. If Drupal is configured to allow file uploads and the processing of...
Blog

What Are The Most Common Types Of Network Vulnerabilities?

Network vulnerabilities constantly evolve, resulting in the loss of valuable information and revenue from businesses. Though threat actors can find new weaknesses every day, some of their methods remain the same. Hackers have tried-and-true methods for infiltrating a seemingly secure network, and they employ various tricks, devices, and information to get the job done.Small businesses often do not...
Blog

Managed Vulnerability Scanning

It's not easy to keep up with threats to your tech systems, services, and applications. With new vulnerabilities appearing on a daily basis, you need a solution that regularly assesses your security operations. This is where managed vulnerability scanning comes into play.Fortra's managed vulnerability scanning service combines modern vulnerability assessment and scanning tools with experienced...
Blog

Penetration Testing Vs Vulnerability Scanning

Penetration testing and vulnerability scanning can be commonly confused as the same type of security testing service. However, issues arise when business owners purchase one type of security scan when they actually need another kind. It may help to understand the differences between the two main types of security testing: penetration testing and vulnerability scanning. Vulnerability scanning and...
Blog

Advisory for cPanel & WHM Vulnerability

cPanel & WHM VulnerabilityDigital Defense, Inc. is disclosing a vulnerability identified in cPanel & WHM discovered by our Vulnerability Research Team (VRT). The engineers at cPanel & WHM are to be commended for their prompt response to the identified flaw and their team’s work with VRT to provide prompt fixes for this cyber security issue.cPanel & WHM has provided a patch for the vulnerability...
Blog

MSP White Labeling Guide

MSP Vulnerability ScannerOur MSP vulnerability scanner will deliver website scanning and network vulnerability assessment services to your customers using our easy to use MSP platform. Our focus: high accuracy, easy management, low cost and integration with your existing systems. With our SaaS platform, automation simplifies the scanning process with deployment that includes a range of servers,...
Blog

Threat and Vulnerability Management

It takes a great deal of time and effort to build an effective cyber security infrastructure. With the threat of malicious attacks increasing every day, businesses and organizations must ensure that their systems are free of any risk or other vulnerabilities that could harm the company. Threat and vulnerability management programs involve honing in on security risks with vulnerability assessments...