Month: February 2019
-
Usermin 1.750 – Remote Command Execution (Metasploit)
Usermin 1.750 – Remote Command Execution …
-
TransMac 12.3 – Denial of Service (PoC)
TransMac 12.3 – Denial of Service …
-
Feng Office 3.7.0.5 – Remote Command Execution (Metasploit)
Feng Office 3.7.0.5 – Remote Command Execution …
-
Ubuntu 16.04.6 LTS Released, Fixes Major APT Security Issue
The security flaw in question potentially gives a remote attacker performing a man-in-the-middle attack the ability to trick APT into installing altered packages. …
-
Solving Security: Repetition or Redundancy?
In life in general — and, of course, in security specifically — it is helpful to understand when I am the problem or when my …
-
Your car is more likely to be hacked by your mechanic than a terrorist
When it comes to car hacking, you should be more worried about dodgy dealers than one-off hackers with criminal intent. Hollywood would …
-
2019 Cisco CISO Benchmark Study
Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes …
-
Vulnerability exposes location of thousands of malware C&C servers
A vulnerability in a tool used by cyber-criminal gangs is now helping researchers expose the locations of thousands of malware …
-
Dow Jones Leak Exposes Watchlist Database
A data leak at Dow Jones exposed the financial firm’s Watchlist database, which contains information on high-risk individuals and was left …
-
In the cloud, things aren’t always what they SIEM: Microsoft rolls out AI-driven Azure Sentinel
Microsoft has wheeled out two new enterprise security tools – Azure Sentinel, a cloud-based SIEM, and Microsoft Threat Experts, an …
-
Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and
Since the release of “Trend Micro Cloud App Security 2017 Report” about a year ago, threats using email as the delivery vector have …
●●●