Vulnerability
Latest about Vulnerability
![Adobe ColdFusion: Adobe logo seen displayed on a smartphone](https://cdn.mos.cms.futurecdn.net/v4KLXLjXMKNGk3ifya7hvm-320-80.jpg)
Warning issued over “incomplete” fix for Adobe ColdFusion vulnerability
By Ross Kelly published
News An incomplete fix for a vulnerability disclosure could be placing users at risk, researchers warned
![Whitepaper: Anticipate, prevent, and minimize the impact of business disruptions, with image of two male colleagues in coats looking at a mobile phone](https://cdn.mos.cms.futurecdn.net/vMQbcmCDCe9hr6G4ojHPPg-320-80.jpg)
Anticipate, prevent, and minimize the impact of business disruptions
By ITPro published
Whitepaper Nine best practices for building operational resilience
![Top ten ways to eliminate cyber threats: eBook cover with green title over image of man using a laptop wearing a lanyard](https://cdn.mos.cms.futurecdn.net/WEwTtifRTfa7TG23aGmRJ6-320-80.jpg)
Top ten ways to anticipate, eliminate, and defeat cyber threats like a boss
By ITPro published
Whitepaper Improve your cyber resilience and vulnerability management while speeding up response times
![Hacker's hand hovering over an illuminated MacBook keyboard - an image denoting hacking](https://cdn.mos.cms.futurecdn.net/y8abhoQWdvEHQQfbBgpqEn-320-80.jpg)
Should your business start a bug bounty program?
By Kate O'Flaherty published
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
![lots of lime-coloured padlocks set against a green background, with one orange padlock in the middle that's unlocked](https://cdn.mos.cms.futurecdn.net/zwqDDCyttCAQQ9fnt5F8rX-320-80.jpg)
MITRE publishes the top 25 most dangerous software weaknesses
By Richard Speed published
News The annual list features the usual suspects and some new entries too
![ASUS logo displayed at COMPUTEX 2023 in Taipei](https://cdn.mos.cms.futurecdn.net/yiL5NjEQcpWpVKGHSyRUwf-320-80.jpg)
ASUS routers receive patches for critical vulnerabilities
By Ross Kelly published
News Nearly 20 models have been affected by a spate of vulnerabilities, including two rated ‘critical’
![Whitepaper cover with title over an image of XDR in a circle positioned in front of a dark cityscape](https://cdn.mos.cms.futurecdn.net/MtPjjHSEfTqgo7yGoRaypN-320-80.jpg)
Accessing the XDR realm
By ITPro published
Whitepaper A guide for MSPs to unleash modern security
![Log4J: Hacker's hand hovering over an illuminated MacBook keyboard - an image denoting hacking](https://cdn.mos.cms.futurecdn.net/y8abhoQWdvEHQQfbBgpqEn-320-80.jpg)
Log4J exploits may rise further as Microsoft continues war on phishing
By Connor Jones published
News Despite Log4J patches being made almost immediately in 2021, exploit attempts are still in the tens of millions
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.