Blog

Blog

What is Vulnerability Scanning and How Does it Work?

Businesses of all sizes have some form of data that a threat actor could exploit. It is even possible for a cyber-criminal to invade a company's available network with the sole purpose of causing web security testing issues. Whether it involves patient medical histories, credit card data, available consumer transaction histories, or trade secrets, if a company uses technology to transmit or store...
Blog

Internal vs. External Vulnerability Scans

As a merchant, you are likely familiar with the strict Payment Card Industry Data Security Standard (PCI DSS) requirements set by the PCI Security Standards Council (SSC). Failure to adhere to PCI compliance standards creates vulnerabilities within your business’s network that could result in a loss of sensitive credit cardholder data from consumers and malicious intrusion into your business...
Blog

Everything You Need for PCI Compliance Scan Success

Do you own a business that stores, processes, or transmits sensitive data such as credit card information online? If so, you must comply with the Payment Card Industry Data Security Standards (PCI DSS), a set of 12 main regulations to protect customer data. The PCI Security Standards Council compiled the PCI DSS. The council’s members consist of major card companies, including MasterCard, Visa,...
Vulnerability Research

Advisory for SolarWinds Orion Vulnerabilities

Advisory Solarwinds Orion Vulnerabilities Security Advisory: SolarWinds OrionAs you have likely seen in news reports over the last weeks, a series of significant security incidents occurred in earlier this month related to malicious cyber actors exploiting VMware® Access and VMware Identity Manager products and a security breach at FireEye uncovering injected malware within SolarWinds network...
Blog

What is Security as a Service? (SECaaS or SaaS)

Businesses are becoming increasingly vulnerable to digital threats and cyber attacks. While you might be aware of the need for security services, developing your in-house solution is often costly, time-consuming, and potentially ineffective against evolving threats.One solution is Security as a Service (SECaaS), which follows the software as a service model. In this type of security management, an...
Blog

SolarWinds Orion Supply Chain (SUNBURST) Backdoor

SolarWinds Orion Supply Chain (SUNBURST) Backdoor VulnerabilitySolarWinds Orion Supply Chain (SUNBURST) BackdoorOn December 13th, the security firm FireEye released the details of a sophisticated manual supply chain attack that affects SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 (with no hotfix installed) or 2020.2 HF 1. The threat actors involved were able to incorporate a malicious ...
Blog

Vulnerability Management: What is It? Process, Best Practices

These days, data breaches within organizations occur so often that they are an expected inevitability. Threat actors are always seeking ways to infiltrate a system to exploit it for personal gain, whether to release sensitive information like trade secrets or slow a company down to a crawl by taking over its network. A business's IT department and security team can prevent this issue with an...
Blog

What is Web Application Penetration Testing?

These days, it seems like most businesses are dealing with a cybersecurity attack that leaks sensitive information to the public and wreaks havoc on their day-to-day operations. Vulnerability scans are a way to identify areas of weakness within an online security network, but they are not enough. Scanning for web application vulnerabilities in conjunction with penetration testing is a more...
Blog

What is Threat Management? Common Challenges and Best Practices

Importance of Cyber Threat ManagementWith the ever increasing number of threats and complex network and system attacks, organizations are constantly struggling to keep up with mitigation and prevention solutions. According to an article from IBM on the Cost of a Data Breach, businesses and other organizations can save an average of $1.2 million when breaches are detected sooner. Detecting cyber...
Vulnerability Research

Advisory for D-Link VPN Router Vulnerabilities

D-Link VPN Router VulnerabilitiesDigital Defense, Inc. is disclosing vulnerabilities identified in D-Link VPN routers discovered by our Vulnerability Research Team (VRT). The engineers at D-Link were prompt in their response when notified of the flaws and have provided hot fixes for these cyber security issues.D-Link has made a patch in the form of a hotfix for the affected firmware versions and...
Blog

Network Scanner

Let's face it. Today's businesses can't function without IT infrastructure. Computers, laptops, phones, and other IT devices are essential for storing and sharing important files and data.With such an essential function, businesses, both big and small, need a professional IT team to maintain and improve their network security. If you think your company is too small for criminals to notice, think...
Vulnerability Research

Drupal Arbitrary PHP Code Execution Vulnerability

Drupal Arbitrary PHP Code Execution VulnerabilityOn November 16th, 2020, several file manipulation vulnerabilities within the PEAR Archive_Tar library were disclosed, given CVE-2020-28948 and CVE-2020-28949. This PEAR library is used by Drupal, although these vulnerabilities impact any platform that utilizes PEAR in their code. If Drupal is configured to allow file uploads and the processing of...
Blog

What Are The Most Common Types Of Network Vulnerabilities?

Network vulnerabilities constantly evolve, resulting in the loss of valuable information and revenue from businesses. Though threat actors can find new weaknesses every day, some of their methods remain the same. Hackers have tried-and-true methods for infiltrating a seemingly secure network, and they employ various tricks, devices, and information to get the job done.Small businesses often do not...
Blog

Managed Vulnerability Scanning

It's not easy to keep up with threats to your tech systems, services, and applications. With new vulnerabilities appearing on a daily basis, you need a solution that regularly assesses your security operations. This is where managed vulnerability scanning comes into play.Fortra's managed vulnerability scanning service combines modern vulnerability assessment and scanning tools with experienced...
Blog

Website Vulnerability Scanner

Hackers will take advantage of any weakness in your cybersecurity systems, especially the most vulnerable parts of your IT infrastructure -- web applications.By design, web applications are publicly accessible on the internet at all times, giving hackers near unlimited access to breach unprotected web servers without being on premises. Fortunately, you can prevent this with a reliable website...
Blog

Penetration Testing Vs Vulnerability Scanning

Penetration testing and vulnerability scanning can be commonly confused as the same type of security testing service. However, issues arise when business owners purchase one type of security scan when they actually need another kind. It may help to understand the differences between the two main types of security testing: penetration testing and vulnerability scanning. Vulnerability scanning and...
Blog

Advisory for cPanel & WHM Vulnerability

cPanel & WHM VulnerabilityDigital Defense, Inc. is disclosing a vulnerability identified in cPanel & WHM discovered by our Vulnerability Research Team (VRT). The engineers at cPanel & WHM are to be commended for their prompt response to the identified flaw and their team’s work with VRT to provide prompt fixes for this cyber security issue.cPanel & WHM has provided a patch for the vulnerability...