Latest Blog Articles
4 MIN READ
A new critical vulnerability affecting PAN-OS has been identified and published last week, putting organizations using Palo Alto Networks’ firewalls at risk. In this blog post, we will demonstrate ho...
Nov 26, 20242.2KViews
0likes
0Comments
3 MIN READ
A new critical Remote Code Execution (RCE) vulnerability affecting CUPS (Common Unix Printing System) has been identified, putting at risk organizations with Unix. In this blogpost we will demonstrat...
Oct 02, 20246.5KViews
0likes
0Comments
Guidance to ensure your organization's Android devices have the latest security updates
Aug 27, 20243KViews
0likes
0Comments
4 MIN READ
Boost security by prioritizing vulnerabilities affecting your critical assets
Aug 14, 20245KViews
1like
1Comment
Guidance on how to use export API to extract vulnerability data , build custom reports, integrate with Microsoft Intune and 3 rd party tools, and more.
Jul 24, 20248.8KViews
3likes
0Comments
Guidance on how to assess potential exposure of the latest "regreSSHion" vulnerability using the integrated security tools from Microsoft
Jul 08, 202414KViews
2likes
2Comments
On April 12, Palo Alto Networks released a security advisory on CVE-2024-3400, a critical vulnerability affecting several versions of PAN-OS, the operating system that runs on the company’...
Apr 15, 20247.5KViews
3likes
0Comments
Latest information about XZ Utils vulnerability and guidance on how to assess your potential exposure.
Apr 02, 202470KViews
7likes
1Comment
General availability of Defender Vulnerability Management in GCC, GCC High and DOD clouds.
Apr 01, 20244.6KViews
1like
0Comments
Microsoft Defender Vulnerability Management uses multiple sources of vulnerability information, including the National Vulnerability Database (NVD), to ensure that organizations have acces...
Mar 26, 20248.2KViews
2likes
0Comments
Resources
Tags
- Threat & Vulnerability Management33 Topics
- microsoft defender for endpoint6 Topics
- apis3 Topics
- vulnerability assessment3 Topics
- Vulnerability3 Topics
- secure configuration assessment2 Topics
- macos2 Topics
- vulnerabilities2 Topics
- CVE2 Topics