Month: February 2018
-
CVE-2018-6188 – django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1. …
django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain …
-
Cybersecurity week Round-Up (2018, Week 5)
Cybersecurity week Round-Up (2018, Week 5) -Let’s try to summarize the most important event occurred last week in 3 minutes. The week …
-
About the Flash zero-day currently exploited in the wild
The zero-day Flash Player vulnerability (CVE-2018-4878) that Adobe warned about on Thursday was leveraged by North Korean hackers. FireEye …
-
NCSC’s ‘Active Cyber Defence’ Initiative Boasts Impressive First-Year Results
The National Cyber Security Centre (NCSC) has today released the results of its Active Cyber Defence (ACD) initiative, which was launched …
-
What is access control? 5 enforcement challenges security professionals need to know
Who should access your company’s data? How do you make sure those who attempt access have actually been granted that …
-
Blockchain for Identity: 6 Hot Projects
ID & Access Management , Technology Blockchain for Identity: 6 Hot Projects Distributed Ledgers For Identity and Access Management Have …
-
Vulnerabilities reached a historic peak in 2017
Vulnerabilities are one of the elements frequently identified in security incidents and, together with other threats …
-
Russian-monitoring Shetlands radar station was nearly sold off
The Royal Air Force has moved one of its air defence radars onto the northern tip of the Shetland Islands as Cold War-era fears about …
-
NixCMS 1.0 – ‘category_id’ SQL Injection
NixCMS 1.0 – ‘category_id’ SQL …
-
Online Voting System – Authentication Bypass
Online Voting System – Authentication …
-
What You Should Know Before You Put Your GDPR Program in Motion
At last, it’s time to flip the switch. In our three most recent blog posts in this series, we’ve been leading up to this moment, …
-
Bee Token ICO participants lose $1 million to phishing scam
Eager would-be investors in the Bee Token Initial Coin Offering (ICO) have fallen prey to a simple phishing scheme in which scam artists …
●●●