Blog

Blog

What is Web Application Penetration Testing?

These days, it seems like most businesses are dealing with a cybersecurity attack that leaks sensitive information to the public and wreaks havoc on their day-to-day operations. Vulnerability scans are a way to identify areas of weakness within an online security network, but they are not enough. Scanning for web application vulnerabilities in conjunction with penetration testing is a more...
Blog

What is Threat Management? Common Challenges and Best Practices

Importance of Cyber Threat ManagementWith the ever increasing number of threats and complex network and system attacks, organizations are constantly struggling to keep up with mitigation and prevention solutions. According to an article from IBM on the Cost of a Data Breach, businesses and other organizations can save an average of $1.2 million when breaches are detected sooner. Detecting cyber...
Vulnerability Research

Advisory for D-Link VPN Router Vulnerabilities

D-Link VPN Router VulnerabilitiesDigital Defense, Inc. is disclosing vulnerabilities identified in D-Link VPN routers discovered by our Vulnerability Research Team (VRT). The engineers at D-Link were prompt in their response when notified of the flaws and have provided hot fixes for these cyber security issues.D-Link has made a patch in the form of a hotfix for the affected firmware versions and...
Blog

Network Scanner

Let's face it. Today's businesses can't function without IT infrastructure. Computers, laptops, phones, and other IT devices are essential for storing and sharing important files and data.With such an essential function, businesses, both big and small, need a professional IT team to maintain and improve their network security. If you think your company is too small for criminals to notice, think...
Vulnerability Research

Drupal Arbitrary PHP Code Execution Vulnerability

Drupal Arbitrary PHP Code Execution VulnerabilityOn November 16th, 2020, several file manipulation vulnerabilities within the PEAR Archive_Tar library were disclosed, given CVE-2020-28948 and CVE-2020-28949. This PEAR library is used by Drupal, although these vulnerabilities impact any platform that utilizes PEAR in their code. If Drupal is configured to allow file uploads and the processing of...
Blog

What Are The Most Common Types Of Network Vulnerabilities?

Network vulnerabilities constantly evolve, resulting in the loss of valuable information and revenue from businesses. Though threat actors can find new weaknesses every day, some of their methods remain the same. Hackers have tried-and-true methods for infiltrating a seemingly secure network, and they employ various tricks, devices, and information to get the job done.Small businesses often do not...
Blog

Managed Vulnerability Scanning

It's not easy to keep up with threats to your tech systems, services, and applications. With new vulnerabilities appearing on a daily basis, you need a solution that regularly assesses your security operations. This is where managed vulnerability scanning comes into play.Fortra's managed vulnerability scanning service combines modern vulnerability assessment and scanning tools with experienced...
Blog

Website Vulnerability Scanner

Hackers will take advantage of any weakness in your cybersecurity systems, especially the most vulnerable parts of your IT infrastructure -- web applications.By design, web applications are publicly accessible on the internet at all times, giving hackers near unlimited access to breach unprotected web servers without being on premises. Fortunately, you can prevent this with a reliable website...
Blog

Penetration Testing Vs Vulnerability Scanning

Penetration testing and vulnerability scanning can be commonly confused as the same type of security testing service. However, issues arise when business owners purchase one type of security scan when they actually need another kind. It may help to understand the differences between the two main types of security testing: penetration testing and vulnerability scanning. Vulnerability scanning and...
Blog

Advisory for cPanel & WHM Vulnerability

cPanel & WHM VulnerabilityDigital Defense, Inc. is disclosing a vulnerability identified in cPanel & WHM discovered by our Vulnerability Research Team (VRT). The engineers at cPanel & WHM are to be commended for their prompt response to the identified flaw and their team’s work with VRT to provide prompt fixes for this cyber security issue.cPanel & WHM has provided a patch for the vulnerability...
Blog

MSP White Labeling Guide

MSP Vulnerability ScannerOur MSP vulnerability scanner will deliver website scanning and network vulnerability assessment services to your customers using our easy to use MSP platform. Our focus: high accuracy, easy management, low cost and integration with your existing systems. With our SaaS platform, automation simplifies the scanning process with deployment that includes a range of servers,...
Blog

Threat and Vulnerability Management

It takes a great deal of time and effort to build an effective cyber security infrastructure. With the threat of malicious attacks increasing every day, businesses and organizations must ensure that their systems are free of any risk or other vulnerabilities that could harm the company. Threat and vulnerability management programs involve honing in on security risks with vulnerability assessments...
Blog

What is Vulnerability Assessment?

Behind every successful organization, within any industry, is an IT system. Everyone in the workforce, from top to bottom, utilizes this system's assets on a daily basis. Think about it. Making quick internet searches, emailing potential clients, and storing data in the cloud, to give you an example, can't be done without an IT device. However, everything comes with a price. Organizations that...
Vulnerability Research

ESXi OpenSLP RCE Vulnerability

ESXi OpenSLP Remote Code Execution (RCE) Vulnerability On October 20th, VMWare disclosed the presence of an RCE vulnerability with the OpenSLP within ESXi. Exposure of the vulnerability is through TCP port 427 and yields a CVSSv3 score of 9.8. The vulnerability is referenced by CVE-2020-3992 and was provided a patch by VMWare on the same day as disclosure. Products affected are ESXi, Workstation...
Blog

Social Engineering Attacks: Common Techniques and How to Prevent Them

Most companies spend significant time and energy protecting sensitive data from hackers by investing in the latest firewalls, anti-virus software, and access control management solutions. However, all this effort is useless without considering the human factor.Social engineering is the most powerful tool in a hacker's arsenal and can help them gain access quickly, quietly, and easily into your...