How to Perform a Vulnerability Scan in 10 Steps

Vulnerability scans play a vital role in identifying weaknesses within systems and networks, reducing risks, and bolstering an organization’s security defenses. Here we’ll discuss how to perform a successful vulnerability scan, some key factors to consider when conducting a vulnerability scan, and distinctions between vulnerability scanning and vulnerability assessment. 10 Steps of a Vulnerability Scan […]

The post How to Perform a Vulnerability Scan in 10 Steps appeared first on eSecurityPlanet.

July 20, 2023
Read More >>

Top API Security Tools 2023

APIs (application programming interfaces) allow applications to communicate with each other, a critically important function in the digital age. Their importance also makes them an attractive target for cyber criminals — according to Akamai, API and application attacks tripled last year. API security tools help protect the integrity of APIs and keep them safe from […]

The post Top API Security Tools 2023 appeared first on eSecurityPlanet.

July 19, 2023
Read More >>

Microsoft Unsure How Chinese Hackers Stole MSA Key to Breach U.S. Agencies

Microsoft has hardened security following a Chinese hack of U.S. government agency email accounts, but some details remain a mystery. Even as the threat has passed, Microsoft officials are still analyzing how a Chinese threat group was able to access U.S. government accounts using a stolen inactive Microsoft account (MSA) consumer signing key. Chinese hacker […]

The post Microsoft Unsure How Chinese Hackers Stole MSA Key to Breach U.S. Agencies appeared first on eSecurityPlanet.

July 19, 2023
Read More >>