OSOC Update: Critical SQL Vulnerability in Progress WhatsUp Gold Evolve Security provides an important update on the critical SQL vulnerability, CVE-2024-6670, found in Progress WhatsUp Gold. September 30, 2024ByRob Kraus,Vice President, Security Services
Evolve Security Expands Reach: Now Featured in G2 Grids for Exposure Management & Vulnerability ScanningEvolve Security Earns Spot in G2’s Fall 2024 Grids for Exposure Management & Vulnerability Scanning. Discover how our award-winning Darwin Attack platform helps businesses reduce attack surfaces, backed by genuine customer feedback and G2’s recognition of our cutting-edge security solutions.
Evolve Security Names Industry Leader Mark Carney PresidentEvolve Security, a leader in offensive cybersecurity, announced the appointment of Mark Carney as its new President. Carney, with over 25 years of experience in cybersecurity, will focus on accelerating growth and expanding go-to-market strategies.
Deciphering DORA – Cracking open the Digital Operational Resilience ActVictor Marchetto prepares for DORA, the EU's new act boosting financial sector resilience by 2025.
Critical Vulnerability in OpenSSH server componentEvolve Security reports a critical vulnerability, CVE-2024-6387, affecting OpenSSH server on glibc-based Linux systems, allowing remote code execution as root. Immediate actions are required.
Must Know Pentest Findings June 2024Explore the latest insights from Evolve Security's Offensive Security team in their June 2024 pentest findings. Discover critical vulnerabilities such as NBNS and LLMNR spoofing, PHP RCE, and the persistent threat of EternalBlue. Learn essential fixes and strategies to fortify your network against these exploits, emphasizing proactive security measures and the shift towards Continuous Pentesting for enhanced resilience. Stay ahead in safeguarding your systems with Evolve Security’s expert recommendations.
Continuous Penetration Testing vs. Vulnerability Management: Which Strategy Best Protects Your Business?As businesses modernize for 2025 and beyond, cybersecurity strategies must evolve to tackle the expanded attack surfaces brought by cloud-based software, SaaS applications, and remote work. In light of increasing cyber threats, such as the recent Volt Typhoon attack, understanding the distinction between Continuous Penetration Testing (Pentesting) and Vulnerability Management is crucial.