<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Vulnerability</title> <atom:link href="https://www.iphere.com/tag/vulnerability/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Microsoft Software, Overall Operating System Vulnerability Disclosures Rise</title><link>https://www.iphere.com/microsoft-software-overall-operating-system-vulnerability-disclosures-rise</link> <comments>https://www.iphere.com/microsoft-software-overall-operating-system-vulnerability-disclosures-rise#comments</comments> <pubDate>Sat, 02 Nov 2013 14:15:48 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Disclosures]]></category> <category><![CDATA[Microsoft]]></category> <category><![CDATA[Operating]]></category> <category><![CDATA[Overall]]></category> <category><![CDATA[Rise]]></category> <category><![CDATA[Software]]></category> <category><![CDATA[System]]></category> <category><![CDATA[Vulnerability]]></category> <guid
isPermaLink="false">http://www.iphere.com/microsoft-software-overall-operating-system-vulnerability-disclosures-rise</guid> <description><![CDATA[As the clock winds down to the sun-setting of support of Microsoft&#8217;s 12-year-old XP operating system on April 8 of next year, Microsoft today released new data that demonstrates the dangers of sticking with the older OS, which accounts for about one-fifth of all operating systems in use today. Case in point: While 17 percent [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/microsoft-software-overall-operating-system-vulnerability-disclosures-rise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>IBM Adds Vulnerability Manager To SIEM Platform</title><link>https://www.iphere.com/ibm-adds-vulnerability-manager-to-siem-platform</link> <comments>https://www.iphere.com/ibm-adds-vulnerability-manager-to-siem-platform#comments</comments> <pubDate>Sat, 27 Jul 2013 08:12:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Adds]]></category> <category><![CDATA[Manager]]></category> <category><![CDATA[Platform]]></category> <category><![CDATA[SIEM]]></category> <category><![CDATA[Vulnerability]]></category> <guid
isPermaLink="false">http://www.iphere.com/ibm-adds-vulnerability-manager-to-siem-platform</guid> <description><![CDATA[By integrating vulnerability scanner into QRadar, IBM aims to help security teams identify and prioritize threats. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/ibm-adds-vulnerability-manager-to-siem-platform/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Another Java Zero-Day Vulnerability Hits Black Market</title><link>https://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market</link> <comments>https://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market#comments</comments> <pubDate>Thu, 17 Jan 2013 02:12:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[another]]></category> <category><![CDATA[Black]]></category> <category><![CDATA[Hits]]></category> <category><![CDATA[Java]]></category> <category><![CDATA[Market]]></category> <category><![CDATA[Vulnerability]]></category> <category><![CDATA[ZeroDay]]></category> <guid
isPermaLink="false">http://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market</guid> <description><![CDATA[Call it malware cash and carry: Less than 24 hours after Oracle on Sunday released a security update that addresses two critical zero-day vulnerabilities in Java that are being actively exploited by attackers, an online vulnerability seller began offering a brand-new Java bug for sale. &#8220;On Monday, an administrator of an exclusive cybercrime forum posted [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Vendors Roll Out Mobile Security, Vulnerability and Forensics Tools</title><link>https://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools</link> <comments>https://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools#comments</comments> <pubDate>Tue, 07 Aug 2012 08:16:26 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Forensics]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Roll]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Tools]]></category> <category><![CDATA[Vendors]]></category> <category><![CDATA[Vulnerability]]></category> <guid
isPermaLink="false">http://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools</guid> <description><![CDATA[Mobile device management (MDM) is top of mind for many nowadays, so it&#8217;s not surprise that mobile security was a focus at Black Hat. Learn more about MDM products announced during the show, as well as new vulnerability management and forensics tools. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/vendors-roll-out-mobile-security-vulnerability-and-forensics-tools/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>eEye Improves Vulnerability Prioritization Capabilities</title><link>https://www.iphere.com/eeye-improves-vulnerability-prioritization-capabilities</link> <comments>https://www.iphere.com/eeye-improves-vulnerability-prioritization-capabilities#comments</comments> <pubDate>Mon, 01 Aug 2011 14:15:11 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Capabilities]]></category> <category><![CDATA[eEye]]></category> <category><![CDATA[Improves]]></category> <category><![CDATA[Prioritization]]></category> <category><![CDATA[Vulnerability]]></category> <guid
isPermaLink="false">http://www.iphere.com/eeye-improves-vulnerability-prioritization-capabilities</guid> <description><![CDATA[The new release of eEye Digital Security&#8217;s CS Management product improves enterprise ability to prioritize remediation and mitigation of known vulnerabilities. Version 2.5 of the vulnerability management offering also adds support for mobile devices and free patching for select non-Windows applications. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/eeye-improves-vulnerability-prioritization-capabilities/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Major New DNS Vulnerability Discovered</title><link>https://www.iphere.com/major-new-dns-vulnerability-discovered</link> <comments>https://www.iphere.com/major-new-dns-vulnerability-discovered#comments</comments> <pubDate>Sat, 26 Feb 2011 00:54:19 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Discovered]]></category> <category><![CDATA[Major]]></category> <category><![CDATA[Vulnerability]]></category> <guid
isPermaLink="false">http://www.iphere.com/major-new-dns-vulnerability-discovered</guid> <description><![CDATA[The Internet Systems Consortium has issued a warning that certain versions of BIND are vulnerable to a denial of service attack. BIND is the most widely used domain name system protocol implementation. The latest version of BIND, 9.7.3, is not affected, but versions 9.7.1 through 9.7.2-P3 are vulnerable. Attackers could exploit the vulnerability to create [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/major-new-dns-vulnerability-discovered/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>