article thumbnail

How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability

Citrix

Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the recent authentication bypass vulnerability in multiple versions of Atlassian Confluence app (versions prior to 2.7.38 and 3.0.5).

article thumbnail

Cybersecurity Tips: Risk and Vulnerability Management

Security Industry Association

Managing cybersecurity risks and vulnerabilities is a critical activity for any robust security program. Risk management and vulnerability management are performed in tandem to help keep your network safer and more secure. What Is Security Risk Management? What Is Security Risk Management?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guidance for reducing HTTP protocol RCE security vulnerability risk with Citrix Web App Firewall (CVE-2022-21907)

Citrix

The HTTP protocol stack remote code execution vulnerability (CVE-2022-21907) lies in the management of HTTP Trailers by the kernel mode driver http.sys.

article thumbnail

The Top Vulnerabilities in Software Security

Assurance IT

Did you know that in 2020, over 18,000 vulnerabilities were created? When your computer is linked to an insecure network your software security can be compromised. Updates that are forgotten, product flaws, and unresolved developer issues expose your clients to computer security risks. What is a Vulnerability?

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. What Is the Log4j Vulnerability?

article thumbnail

Seven principles of the zero trust security model

Citrix

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. … The post Seven principles of the zero trust security model first appeared on Citrix Blogs. Related Stories Why should you evolve your multi-factor authentication to adaptive authentication?

article thumbnail

Microsoft Teams Client Stores User Authentication Tokens in Unsecured Text Format

LAN Infotech

Microsoft Teams Client Stores User Authentication Tokens in Unsecured Text Format. Businesses can protect themselves from this exploit by taking some security precautions. A security vulnerability has been discovered in Microsoft Teams that could allow an attacker to gain access to a user’s account and data. Key Points.