The Hidden Attack Surface That's Growing Out of Control

The Hidden Attack Surface That's Growing Out of Control

RiskIQ's vulnerability landscape report offers a high-level view of critical vulnerabilities in 12 widely used remote access and perimeter devices. The findings show that the rapidly increasing adoption of these devices introduces a range of critical, rapidly proliferating vulnerabilities - of which nation-states are already taking advantage to attack organizations.

Download the report to find the total number of vulnerabilities in online devices across the internet, including:

  • Palo Alto Global Protect
  • F5 Big-IP
  • IBM WebSphere Application Server
  • Oracle WebLogic
  • Microsoft Remote Desktop Gateway
  • Citrix NetScaler Gateway
  • Cisco ASA & Firepower
  • Oracle iPlanet Web Server 7.0



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.