Risks and Vulnerabilities

These articles focus on specific risk findings and vulnerabilities. Learn how to resolve and mitigate common issues facing your organization.

Risks and Vulnerabilities

Risks and Vulnerabilities

Your Database Exposure Risk

You use a database management system to interact with your stored data, so it's critical to implement security features that protect the DBMS and any data.
Read more
Risks and Vulnerabilities

Your WordPress Data Exposure Risks

43% of all websites are built in WordPress, and custom sites rely on plugins and themes that can be attack vectors.
Read more
Risks and Vulnerabilities

The SysAid Zero-Day Vulnerability: CVE-2023-47246

SysAid on-premises software faces a zero-day vulnerability for path traversal, currently tracked as CVE-2023-47246.
Read more
Risks and Vulnerabilities

How Tracking Pixels Impact Cybersecurity

Tracking pixels are a powerful way to aggregate user behaviors, but they can also become a siphon for data leaks.
Read more
Risks and Vulnerabilities

How to Resolve SSL Configuration Risks

A misconfigured SSL certificate puts communication at risk, whereas a revoked certificate could render the site inaccessible to most browsers.
Read more
Risks and Vulnerabilities

What is a Content Security Policy (CSP)?

The Content Security Policy is a standard to prevent cross-site scripting attacks (XSS), clickjacking, packet sniffing, and malicious code injection.
Read more
Risks and Vulnerabilities

Cisco's Zero-Day Vulnerability (CVE-2023-20198)

CVE-2023-20198 is a critical, unpatched vulnerability impacting Internet-facing Cisco IOS XE devices.
Read more
Risks and Vulnerabilities

Your Sender Policy Framework (SPF) Risk Exposure

If you do not set up an SPF record, untrustworthy emails from unauthorized sources can be sent to your employees and customers, seemingly from your domain.
Read more
Risks and Vulnerabilities

Atlassian Confluence Zero-Day Vulnerability: What Is CVE-2023-25515?

CVE-2023-22515 is a privilege escalation and broken access control vulnerability affecting Confluence Data Center and Confluence Server.
Read more
Risks and Vulnerabilities

What is CVE-2023-4863? Google's libwebp at risk

A major vulnerability in the libwebp library puts web users at risk of remote code execution.
Read more
Risks and Vulnerabilities

What is a Remote Access Trojan (RAT)?

UpGuard Breach Risk provides continuous monitoring and automated scanning for potential threats, including exposed ports that known RATs can exploit.
Read more
Risks and Vulnerabilities

How to Fix Your Domain Name Registrar Issues

Secure your domain against common findings related to your domain name registration.
Read more
Risks and Vulnerabilities

Protect Your Site from Domain Expiration

Domains that expire become unavailable for users, which can negatively impact your brand reputation. Keep track of expiry dates for stable domain access.
Read more
Risks and Vulnerabilities

Protect Against HTTP Attacks with HTTPS Strict Transport Policy

Ensure your HTTPS Strict Transport Policy is configured properly to ensure secure communications.
Read more
Risks and Vulnerabilities

Your HTTPS Redirection Risk Exposure

Without encrypted communications, information transfer is not protected and sensitive data becomes vulnerable to attackers. Set up HTTPS redirection.
Read more
Risks and Vulnerabilities

How to Respond to CVE-2023-24489 Impacting Citrix ShareFile

An access control vulnerability impacting Citrix ShareFile can lead to remote code execution.
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating