Risks and Vulnerabilities
Remote Access and Cybersecurity Exposure
Remote access is a powerful tool for configuration and system management, but it also introduces new risks around unauthorized access and unsecured network
Read more
Connect Secure No More: Ivanti's Zero-Day Vulnerabilities (CVE-2024-21887 and CVE-2023-46805)
Two chainable zero-day vulnerabilities face Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS): CVE-2023-46805 and CVE-2024-21887.
Read more
Exposure Risks with File Transfer Protocol (FTP)
Because file transfer moves files over the internet, insecure file transfer ports create opportunities for malicious actors.
Read more
Returning to the Office? Protect the Machines
Open ports that direct traffic to and from machines in the office could become an attack vector. Secure these ports to protect your sensitive data.
Read more
How to Resolve Google Safe Browsing Risks
Understand what the risks mean and how to fix them when Google Safe Browsing flags your website for cybersecurity concerns.
Read more
How Diffie-Hellman Key Exchange Provides Encrypted Communications
The Diffie-Hellman key exchange is a method for agreeing to and calculating a secret symmetric key between parties on a public network.
Read more
Exposed Server Headers and Cybersecurity Risk
Your HTTP response header carries server information. If exposed, that server information can increase your attack surface.
Read more
DMARC Configuration Risks
Implementing a DMARC policy protects your email recipients, while maintaining your domain and brand credibility.
Read more
LDAP Cybersecurity Risks and Prevention Techniques
LDAP provides communication with data, including sensitive data like user credentials, so take proactive security measures.
Read more
Your Database Exposure Risk
You use a database management system to interact with your stored data, so it's critical to implement security features that protect the DBMS and any data.
Read more
Your WordPress Data Exposure Risks
43% of all websites are built in WordPress, and custom sites rely on plugins and themes that can be attack vectors.
Read more
The SysAid Zero-Day Vulnerability: CVE-2023-47246
SysAid on-premises software faces a zero-day vulnerability for path traversal, currently tracked as CVE-2023-47246.
Read more
How Tracking Pixels Impact Cybersecurity
Tracking pixels are a powerful way to aggregate user behaviors, but they can also become a siphon for data leaks.
Read more
How to Resolve SSL Configuration Risks
A misconfigured SSL certificate puts communication at risk, whereas a revoked certificate could render the site inaccessible to most browsers.
Read more
What is a Content Security Policy (CSP)?
The Content Security Policy is a standard to prevent cross-site scripting attacks (XSS), clickjacking, packet sniffing, and malicious code injection.
Read more
Cisco's Zero-Day Vulnerability (CVE-2023-20198)
CVE-2023-20198 is a critical, unpatched vulnerability impacting Internet-facing Cisco IOS XE devices.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities