Risks and Vulnerabilities

These articles focus on specific risk findings and vulnerabilities. Learn how to resolve and mitigate common issues facing your organization.

Risks and Vulnerabilities

Risks and Vulnerabilities

Remote Access and Cybersecurity Exposure

Remote access is a powerful tool for configuration and system management, but it also introduces new risks around unauthorized access and unsecured network
Read more
Risks and Vulnerabilities

Connect Secure No More: Ivanti's Zero-Day Vulnerabilities (CVE-2024-21887 and CVE-2023-46805)

Two chainable zero-day vulnerabilities face Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS): CVE-2023-46805 and CVE-2024-21887.
Read more
Risks and Vulnerabilities

Exposure Risks with File Transfer Protocol (FTP)

Because file transfer moves files over the internet, insecure file transfer ports create opportunities for malicious actors.
Read more
Risks and Vulnerabilities

Returning to the Office? Protect the Machines

Open ports that direct traffic to and from machines in the office could become an attack vector. Secure these ports to protect your sensitive data.
Read more
Risks and Vulnerabilities

How to Resolve Google Safe Browsing Risks

Understand what the risks mean and how to fix them when Google Safe Browsing flags your website for cybersecurity concerns.
Read more
Risks and Vulnerabilities

How Diffie-Hellman Key Exchange Provides Encrypted Communications

The Diffie-Hellman key exchange is a method for agreeing to and calculating a secret symmetric key between parties on a public network.
Read more
Risks and Vulnerabilities

Exposed Server Headers and Cybersecurity Risk

Your HTTP response header carries server information. If exposed, that server information can increase your attack surface.
Read more
Risks and Vulnerabilities

DMARC Configuration Risks

Implementing a DMARC policy protects your email recipients, while maintaining your domain and brand credibility.
Read more
Risks and Vulnerabilities

LDAP Cybersecurity Risks and Prevention Techniques

LDAP provides communication with data, including sensitive data like user credentials, so take proactive security measures.
Read more
Risks and Vulnerabilities

Your Database Exposure Risk

You use a database management system to interact with your stored data, so it's critical to implement security features that protect the DBMS and any data.
Read more
Risks and Vulnerabilities

Your WordPress Data Exposure Risks

43% of all websites are built in WordPress, and custom sites rely on plugins and themes that can be attack vectors.
Read more
Risks and Vulnerabilities

The SysAid Zero-Day Vulnerability: CVE-2023-47246

SysAid on-premises software faces a zero-day vulnerability for path traversal, currently tracked as CVE-2023-47246.
Read more
Risks and Vulnerabilities

How Tracking Pixels Impact Cybersecurity

Tracking pixels are a powerful way to aggregate user behaviors, but they can also become a siphon for data leaks.
Read more
Risks and Vulnerabilities

How to Resolve SSL Configuration Risks

A misconfigured SSL certificate puts communication at risk, whereas a revoked certificate could render the site inaccessible to most browsers.
Read more
Risks and Vulnerabilities

What is a Content Security Policy (CSP)?

The Content Security Policy is a standard to prevent cross-site scripting attacks (XSS), clickjacking, packet sniffing, and malicious code injection.
Read more
Risks and Vulnerabilities

Cisco's Zero-Day Vulnerability (CVE-2023-20198)

CVE-2023-20198 is a critical, unpatched vulnerability impacting Internet-facing Cisco IOS XE devices.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Ready to see
UpGuard in action?