The foundation for efficient IT Management.
Complete visibility for everyone.
Fuel any IT scenario.
Flexibility for your industry.
All Technology Asset Intelligence in 1 place.
In-depth discovery across the technology estate.
Always up-to-date with actionable insights.
Drive change with IT data.
Sign up for a free 14-day trial to access all features and try Lansweeper with real data.
Find a trusted partner.
Explore our partner ecosystem.
Find the resources you need.
Reach the full Lansweeper potential.
How to set up and use Lansweeper.
How organizations use Lansweeper.
Who we are and what we do.
⚡ TL;DR | Find the Siemens Vulnerability Report in your Lansweeper Cloud Site Industrial Cybersecurity company Claroty has uncovered a critical vulnerability
PrintNightmare is a new bug that exposes Windows servers to remote code execution attacks through a Windows Print Spooler vulnerability that
Dell’s SupportAssist package strikes again with a new vulnerability. This time the Dell SupportAssist vulnerability enables privileged remote attackers to
The Most Exploited Vulnerabilities in 2016-2019 as Reported by the FBI ⚡ TL;DR | Go Straight to Audit Report It probably won’t
Audit Finds Critical Vulnerability in Popular macOS Terminal Emulator A Mozilla security audit has led to the discovery of a
Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Successful
Google has released Chrome 76 to the Stable desktop channel, with new features and 43 security fixes, with five of
It’s a jungle out there, and vulnerability threats abound in the digital age. However, the investments you make in cybersecurity
Intel released fixes for several potential security vulnerabilities in system firmware for Intel® NUC which may allow escalation of privilege,
June 2019 Patch Tuesday Fixes 88 Vulnerabilities TL;DR – Go Straight to the Patch Tuesday Report Microsoft released its June
TL;DR – Go Straight to the Report You can’t protect what you don’t know exists. The discovery of hard- and
WhatsApp Exploit Used to Install Pegasus Spyware Whatsapp has patched a high-risk vulnerability that allows hackers to remotely install surveillance
NVIDIA issued a security bulletin and update to fix three high and medium severity security issues in the NVIDIA GPU
A new Internet Explorer XXE vulnerability has been disclosed. This zero-day vulnerability allows attackers to steal local files if someone
Atlassian released a security advisory regarding two critical vulnerabilities. Both WebDAV and the Widget Connector are vulnerable and have been
TL;DR >> Go straight to the report Time to update your PuTTY installations immediately to the latest version. Why the
Google Patches Actively Exploited Chrome Zero-Day Flaw Time to update your Google Chrome installations immediately to the latest version. Why
WinRAR Flaw Found Actively Being Exploited A critical 19-year-old WinRAR vulnerability disclosed last week has now been spotted actively being
The Popular Windows data compression tool WinRAR has patched a serious 19-year-old security flaw that was discovered on its platform,
Including Fix for Actively Exploited IE Vulnerability Microsoft has issued its second Patch Tuesday for this year to address a
CVE-2018-16858 Directory Traversal Vulnerability in Script Execution LibreOffice is a free and open-source office suite that includes applications for word
Critical Exchange Memory Corruption Vulnerability Fixed Microsoft starts the new year with a bang: January’s Patch Tuesday includes a list of 49
You can’t protect what you don’t know exists. The top 5 Critical Security Controls of the Center for Internet Security’s highlight
Multiple Vulnerabilities in Mozilla Firefox Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the
Discover devices vulnerable to the MEGA Chrome extension hack