Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

IONIX

Threat Exposure Management for the Expanding Attack Surface

How to Expose Critical Threats and Proactively Prevent Breaches In today's cyber landscape, identifying and mitigating threats from an attacker's perspective is not just an option – it's a necessity. Watch this insightful fireside chat with Forrester Senior Analyst Erik Nost and IONIX CEO Marc Gaffan, as they dive into the world of Threat Exposure Management (TEM) and its pivotal role in safeguarding your business.

Digital Supply-Chain Attacks: Exploits and Statistics

Growing digital connectivity has led to the rise of digital supply-chain attacks. This session will explain, demonstrate, and provide statistics about the complexity of the problem and about attacks that arose due to dependencies on external infrastructures. While there is no simple solution to the problem, we will present a strategy to reduce exposure and create processes to avoid such vulnerabilities.

Gartner CTEM Starts with EASM

External Attack Surface Management(EASM) has emerged as a cybersecurity gold standard – a core component of modern cybersecurity programs. As digital organizations have grown more complex, getting the whole picture of the external attack surface – what’s connected to what and how this could pose danger – is a maze that only-world-class EASM solutions have been able to successfully navigate.

The State of Citrix Zero-Day Vulnerabilities 2023

Critical zero-day Citrix CVE-2023-3519 is still being exploited two months after Citrix released a patch. IONIX research found that 19% of the CVE-2023-3519 vulnerabilities are still unmitigated in comparison to only 3% among IONIX customers. In addition, IONIX customers were able to resolve this critical risk three times faster.

Cisco VPN Zero-Day exploited by ransomware gangs (CVE-2023-20269) - Insights and best practices for defense Copy

In the tech security scene, we’re always on the lookout for new vulnerabilities, especially when they are already exploited in the wild. The latest zero-day CVE-2023-20269 is hitting Cisco’s Adaptive Security Appliance VPN features. The attack surface scan conducted by IONIX research on a sample of organizations indicates that 13% of these appliances are potentially vulnerable through at least one interface.

Cisco VPN Zero-Day exploited by ransomware gangs (CVE-2023-20269) - Insights and best practices for defense

In the tech security scene, we’re always on the lookout for new vulnerabilities, especially when they are already exploited in the wild. The latest zero-day CVE-2023-20269 is hitting Cisco’s Adaptive Security Appliance VPN features. The attack surface scan conducted by IONIX research on a sample of organizations indicates that 13% of these appliances are potentially vulnerable through at least one interface.

Vulnerability Assessment Methodology: How to Perform a Vulnerability Assessment

There are flaws in every organization’s IT infrastructure, along with software that requires patching. These flaws could arise from various sources, such as human errors during software coding. Hackers are always on the lookout to exploit these flaws and applications. However, by following a vulnerability assessment methodology to perform vulnerability assessments, organizations can identify these weaknesses before the cyber adversaries do.