Risks and Vulnerabilities
Understanding CVE-2024-47176: Mitigating CUPS Vulnerabilities
Learn how to detect and mitigate CUPS vulnerabilities, including CVE-2024-47176.
Read more
ServiceNow Vulnerabilities: CVE-2024-4789 and CVE-2024-5217
Learn about two critical vulnerabilities affecting the ServiceNow platform (CVE-2024-4789 and CVE-2024-5217) and how UpGuard can help.
Read more
How to Respond: OpenSSH Vulnerability CVE-2024-6387
Learn the best course of action for preventing Remote Code Execution through an exploitation of regreSSHion.
Read more
Email Messaging Protocols and Port Exposure
Learn more about email messaging protocols and how to protect exposed ports.
Read more
Internet of Risks: Cybersecurity Risk in the Internet of Things
With the continuing development of the Internet of Things come new attack surfaces and cybersecurity risk directly related to the IoT.
Read more
Programmable Logic Controllers and Cybersecurity Risk
Safety and security are critical when using programmable logic controllers for industrial manufacturing and critical infrastructure.
Read more
Critical Authentication Bypass Vulnerability in ScreenConnect (CVE-2024-1709)
Cybercriminals can chain vulnerabilities in ScreenConnect, leveraging authentication bypass first and then moving through the system with path traversal.
Read more
A Grim Outlook for Microsoft with MonikerLink and Exchange Vulnerabilities
Dual vulnerabilities allow remote code execution, leaked credentials, and privilege escalation among Microsoft Outlook and Microsoft Exchange Server.
Read more
VPN Security Concerns
VPN internet connections protect web traffic through an encrypted tunnel, keeping sensitive data from interception. So what are the risks?
Read more
Don't Git Attacked: How Git Protects Against Source Code Exposure
Git is widely used for version control of production code across industry sectors. Keep your repositories and your applications protected.
Read more
Hackers Ready to Go Anywhere with Critical Vulnerability in GoAnywhere MFT (CVE-2024-0204)
A critical authentication bypass exploit in the GoAnywhere MFT software allows unauthorized users to create admin users and bypass authentication.
Read more
DNS Security Extensions (DNSSEC) and Cybersecurity Risk
DNSSEC creates additional security for your domain, protecting against a variety of DNS-related attacks.
Read more
Remote Access and Cybersecurity Exposure
Remote access is a powerful tool for configuration and system management, but it also introduces new risks around unauthorized access and unsecured network
Read more
Connect Secure No More: Ivanti's Zero-Day Vulnerabilities (CVE-2024-21887 and CVE-2023-46805)
Two chainable zero-day vulnerabilities face Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS): CVE-2023-46805 and CVE-2024-21887.
Read more
Exposure Risks with File Transfer Protocol (FTP)
Because file transfer moves files over the internet, insecure file transfer ports create opportunities for malicious actors.
Read more
Returning to the Office? Protect the Machines
Open ports that direct traffic to and from machines in the office could become an attack vector. Secure these ports to protect your sensitive data.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities