Remote work Infographic<br />

Listen to The Threat Talks on:

Deep Dive – Ivanti EPM

Your Presentors

Lieuwe Jan Koning

Co-Founder and CTO ON2IT Group

Luca Cipriano

Threat Intel Specialist ON2IT

Rob Maas Field CTO

Rob Maas

Field CTO ON2IT

Remote work Infographic

Ivanti EPM – SQL injection attack

The discovery of a critical SQL injection vulnerability in Ivanti Endpoint Manager (EPM) software highlights a significant risk in the cybersecurity landscape.

Such vulnerabilities underscore the potential for extensive damage, allowing attackers to execute unauthorized activities that could range from data theft to deploying malware across an organization’s network.

To tackle these security risks, it’s crucial to strengthen network defenses. This involves breaking up the network into smaller, manageable segments and using systems that prevent unauthorized access.

Additionally, setting up Endpoint Detection and Response (EDR) tools is key. These tools help in identifying, examining, and dealing with cybersecurity threats, serving as a critical line of defense against the constantly changing threats aimed at crucial IT systems.

This strategy highlights the importance of always being alert and ready to update security measures to protect important digital information effectively.

Download the infographic for the complete overview

Episode details:

In this episode of the Threat Talks – deep dive, we zoom in on the vulnerabilities threatening the backbone of organizational infrastructure: endpoint management.

Specifically, we shine a light on a critical SQL injection vulnerability found in the Ivanti Endpoint Manager (EPM) software. Through a detailed comparison with the infamous SolarWinds supply chain attack, this discussion unpacks the potential havoc such vulnerabilities can wreak when exploited.

Our experts underline how crucial Ivanti EPM is for managing endpoints, essential for everything from finding devices to installing software and updates. However, the same features that make Ivanti EPM so valuable also make a breach particularly harmful, as it could let attackers spread harmful software or take over devices.

The discussion also shows how we can protect against these dangers. It highlights the importance of network security steps like breaking the network into smaller parts and using systems to prevent unauthorized access, creating a strong barrier against threats.

Gain more insight on the importance of Endpoint Detection and Response (EDR) tools, which are key for spotting and stopping threats, keeping our digital spaces safe from the growing complexity of cyber threats.

Subscribe to our Spotify channel and stay up to date with every cybersecurity treat.