Month: May 2021
-
Schlix CMS 2.2.6-6 – ‘title’ Persistent Cross-Site Scripting (Authenticated)
Schlix CMS 2.2.6-6 – ‘title’ Persistent Cross-Site Scripting …
-
Schlix CMS 2.2.6-6 – Remote Code Execution (Authenticated)
Schlix CMS 2.2.6-6 – Remote Code Execution …
-
ACIC believes there’s no legitimate reason to use an encrypted communication platform
The Australian Criminal Intelligence Commission (ACIC) believes there is no legitimate reason for a law-abiding member of the community to …
-
Chrome on Windows turns on Intel, AMD chip-level defenses against malicious websites
Version 90 of Google’s Chrome browser includes a bit of extra security for users of recent versions of Windows and the latest x86 …
-
Are NFTs safe? 3 things you should know before you buy
NFTs, or non-fungible tokens, have captured the attention (and wallets) of consumers and businesses around the world. This is largely in …
-
JET engine flaws can crash Microsoft’s IIS, SQL Server, say Palo Alto researchers
A trio of researchers at Palo Alto Networks has detailed vulnerabilities in the JET database engine present on millions of Windows …
-
Email security is a human issue
Research suggests that email is the most common point of entry for malware, providing access in 94% of cases, so it’s unsurprising that …
-
JET engine flaws can crash IIS and SQL server say Palo Alto researchers
A trio of researchers from Palo Alto Networks has detailed vulnerabilities in the JET Engine database present on millions of Windows …
-
What contractors should start to consider with the DoD’s CMMC compliance standards
Q1 2021 has been a tumultuous period in our era of cyber espionage. The Center For Strategic & International Studies (CSIS), which has been …
-
Dispelling four myths about automating PKI certificate lifecycle management
The public key infrastructure (PKI) underpins the most effective strategy for securing communications between machines, network and mobile …
-
The top three collaboration security misses by CISOs
Back before enterprises embraced the cloud and its many benefits, software was released every two years through a formal change management …
-
Inside look at the Genesis Market, a cybercriminal market
Digital Shadows released new research into the movement of cybercriminal marketplaces with a feature on Genesis market. According to the …
●●●