Vulnerability
Discover expert analysis on vulnerability with news, features and insights from the team at IT Pro.
- 
 The GoAnywhere data breach explainedIn-depth How a zero-day vulnerability in Fortra’s GoAnywhere MFT product led to breaches of high-profile firms across the globe By Connor Jones Last updated In-depth
- 
 Email still the top vector for attackersNews Infection chains might change, but the initiation method remains the same By Richard Speed Published News
- 
 Microsoft defends “negligent” security approach that prolonged vulnerability fix for five monthsNews The tech giant has refuted claims that its practices have left customers “in the dark” By Ross Kelly Published News
- 
 Top 12 most-exploited security vulnerabilities revealed by national cyber security agenciesNews Cyber leaders from the Five Eyes alliance said attackers favor older vulnerabilities rather than new ones By Richard Speed Published News
- 
 Microsoft under fire for “negligent” security practices in scathing critique by industry execNews Microsoft took more than 90 days to issue a partial fix for a critical Azure vulnerability, researchers found By Ross Kelly Published News
- 
 Apple patches zero day linked to spyware campaignNews Kaspersky researchers were the first to report a zero day used in a sophisticated attack chain By Rory Bathgate Published News
- 
 Citrix discloses critical NetScaler Gateway vulnerabilityNews Users of affected products have been urged to implement patches immediately to mitigate risk By Ross Kelly Published News
- 
 Warning issued over “incomplete” fix for Adobe ColdFusion vulnerabilityNews An incomplete fix for a vulnerability disclosure could be placing users at risk, researchers warned By Ross Kelly Published News
- 
 Anticipate, prevent, and minimize the impact of business disruptionsWhitepaper Nine best practices for building operational resilience By ITPro Published Whitepaper
- 
 Top ten ways to anticipate, eliminate, and defeat cyber threats like a bossWhitepaper Improve your cyber resilience and vulnerability management while speeding up response times By ITPro Published Whitepaper
- 
 Should your business start a bug bounty program?In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too? By Kate O'Flaherty Published In-depth
- 
 MITRE publishes the top 25 most dangerous software weaknessesNews The annual list features the usual suspects and some new entries too By Richard Speed Published News