Risks and Vulnerabilities
How to Resolve Google Safe Browsing Risks
Understand what the risks mean and how to fix them when Google Safe Browsing flags your website for cybersecurity concerns.
Read more
How Diffie-Hellman Key Exchange Provides Encrypted Communications
The Diffie-Hellman key exchange is a method for agreeing to and calculating a secret symmetric key between parties on a public network.
Read more
Exposed Server Headers and Cybersecurity Risk
Your HTTP response header carries server information. If exposed, that server information can increase your attack surface.
Read more
DMARC Configuration Risks
Implementing a DMARC policy protects your email recipients, while maintaining your domain and brand credibility.
Read more
LDAP Cybersecurity Risks and Prevention Techniques
LDAP provides communication with data, including sensitive data like user credentials, so take proactive security measures.
Read more
Your Database Exposure Risk
You use a database management system to interact with your stored data, so it's critical to implement security features that protect the DBMS and any data.
Read more
Your WordPress Data Exposure Risks
43% of all websites are built in WordPress, and custom sites rely on plugins and themes that can be attack vectors.
Read more
The SysAid Zero-Day Vulnerability: CVE-2023-47246
SysAid on-premises software faces a zero-day vulnerability for path traversal, currently tracked as CVE-2023-47246.
Read more
How Tracking Pixels Impact Cybersecurity
Tracking pixels are a powerful way to aggregate user behaviors, but they can also become a siphon for data leaks.
Read more
How to Resolve SSL Configuration Risks
A misconfigured SSL certificate puts communication at risk, whereas a revoked certificate could render the site inaccessible to most browsers.
Read more
What is a Content Security Policy (CSP)?
The Content Security Policy is a standard to prevent cross-site scripting attacks (XSS), clickjacking, packet sniffing, and malicious code injection.
Read more
Cisco's Zero-Day Vulnerability (CVE-2023-20198)
CVE-2023-20198 is a critical, unpatched vulnerability impacting Internet-facing Cisco IOS XE devices.
Read more
Your Sender Policy Framework (SPF) Risk Exposure
If you do not set up an SPF record, untrustworthy emails from unauthorized sources can be sent to your employees and customers, seemingly from your domain.
Read more
Atlassian Confluence Zero-Day Vulnerability: What Is CVE-2023-25515?
CVE-2023-22515 is a privilege escalation and broken access control vulnerability affecting Confluence Data Center and Confluence Server.
Read more
What is a Remote Access Trojan (RAT)?
UpGuard BreachSight provides continuous monitoring and automated scanning for potential threats, including exposed ports that known RATs can exploit.
Read more
What is CVE-2023-4863? Google's libwebp at risk
A major vulnerability in the libwebp library puts web users at risk of remote code execution.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities