Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Log4j and Beyond: How to Survive Open Source Zero-Days Shandra Gemmiti, Synopsys and Mike McGuire, Synopsys Whether you’re fighting a fire or mitigating a zero-day open source vulnerability, the response is important but it’s not the only factor. How you pre... 4 months ago | 37 mins [Replay] Threat Researchers Live - ep 17 - Log4shell (log4j), Amazon Shortage Pascal Geenens & Daniel Smith, Radware --Topics-- Log4Shell, Log4j CVE-2021-44228 Ransomware & RDoS MANGA/Dark.IoT Update Beijing 2022 diplomatic boycott Amazon Outage Cream Cheese Shortag... 7 months ago | 92 mins Aqua Cloud Native Security JumpStart: Container Image Scanning Iheanyi Njeze, Solutions Architect Full cloud native security requires more than application security testing and network monitoring. It requires a concerted approach to vulnerability m... August 9, 2022 3:00pm Thursday ThreatCast - Exposing and Mitigating the Follina Vulnerability Matt Kiely, Alex Jones On May 27th 2022, a new zero-day remote code execution (RCE) vulnerability (CVE-2022-30190P) was discovered in the Microsoft Support Diagnostic Tool (... 2 weeks ago | 39 mins Building an Advanced Vulnerability Management Program Chandrashekhar, CEO; Jagsir, Marketing Director | SecPod Siloed interfaces, lack of remediation controls, and not looking at vulnerabilities beyond CVEs are the major pitfalls of conventional vulnerability m... 2 weeks ago | 54 mins July TRU Intelligence Briefing Paul Aitken, Spence Hutchinson, Keegan Keplinger, Matt Tilley, Derek Thomas, Ryan Westman In this month’s TRU Intelligence Briefing, the Threat Response Unit reviewed: - Threat Landscape: A review of recently observed malware and notable vu... 3 weeks ago | 43 mins Implementing FIPS with maximum security configurations Rajan Patel, Landscape Product Manager If your organisation is implementing FIPS in an air-gapped environment, whether in a private datacenter or on a public cloud, there are unique securit... 3 weeks ago | 40 mins Beyond the CVE: Addressing Novel Supply Chain Risks FOSSA Security Team Identifying and mitigating known vulnerabilities in open source code has long been a foundational part of secure software development. But over the pa... 3 months ago | 41 mins Cyber Attacks Explained x Pentera Labs: VMware vCenter CVE-2022-22948 Yuval Lazar, Senior Security Researcher at Pentera, Oren Domaczewski, Product Manager at Pentera VMware has recently issued a patch for an Information Disclosure vulnerability CVE-2022-22948 discovered by the Pentera Labs team, impacting over 500,... 3 months ago | 27 mins SAP HotNews and CVE kernel patch Bernd Engist New ICMAD bugs require immediate attention and patching for SAP systems The dust has not yet settled on the CVSSv3 10.0 score Log4j security vulnerab... 4 months ago | 19 mins Load more