The vulnerability meant that hackers could potentially gain full control of the device and listen in on calls. Moving forward, Avaya is recommending for its users to also install firewalls and use access controls lists and physical security to protect the devices.
Senior security researcher at McAfee Philippe Laulheret found the vulnerability.
Source: SoftwareReviews Avaya Scorecard, Accessed August 13, 2019.
Avaya’s dominance in the communications marketplace is likely to be unaffected by this vulnerability, especially since the issue is now resolved. Avaya is consistently identified as a market leader across a variety of sectors, with the latest praise from Aragon Research Globe for Avaya’s contact center deployments and advances in AI-enabled customer support.
Members using Avaya devices should be sure to follow Avaya’s advice by first accessing their new firmware and then ensuring further security measures.
Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine Learning (ML), and Artificial Intelligence (AI).
In today’s world many security teams require a simplified holistic method to consolidate disparate log data, threat anomalies, and responses. Due to these pressured requirements, organizations across the world are adopting or considering cloud-native Security Information and Event Management (SIEM) solutions.
KBV Research released its Global Security Information and Event Management (SIEM) Market Forecast report last month. In light of the recent COVID-19 pandemic, the SIEM market report highlights continued growth for the security solution and offers insights into how SIEM will continue to be essential for enterprises going forward.
As the Security Information and Event Management (SIEM) market continues to grow, organizations now have more options than ever to decide which SIEM is right for them. While SIEM vendors continue to innovate, the final decision often comes down to price. In the second of this five-part series on SIEM pricing, we will dive into pricing by data volume.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for any application that requires encryption in any location – edge, datacenter, or cloud – the proverbial magic bullet for KMS.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.