In this article we discuss how automated detection combined with network access control can respond almost instantly to a compromised network or device.
Find out what OT security vulnerabilities you should watch out for and what your company can do to protect your critical systems from threats.
Save time and money by including fuzz testing in your SDLC. Detect vulnerabilities, flaws, bugs and zero-day exploits before your software is deployed.
Learn the Mobile Device Management (MDM) and BYOD security essentials to help your company mitigate risk from mobile security threats.
HUAWEI P30 with versions earlier than 10.1.0.135 Improper Verification of Cryptographic Signature Vulnerability
Published on August 13th, 2020 Details The system does not improper check signature of specific software package, an attacker may exploit this vulnerability to load a crafted software package to the device. Vulnerable...
HUAWEI P30 smartphone versions 10.1.0.135 Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Published on August 13th, 2020 Details HUAWEI P30 smartphone with versions earlier than 10.1.0.135(C00E135R2P11) have an improper input verification vulnerability. An attribution in a module is not set correctly and...