Software secure? What about your hardware? Researchers at the DEF CON 2018 cyber security convention revealed that they could access an internal network using legacy technology a fax machine. Fax is now viewed by many as obsolete, meaning its security …Continue Reading
The hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3, and Reaver. It offers a basic and simple UI to utilize these devices without writing commands in terminal and just by copy&pasting MAC addresse…Continue Reading
. Common methods AD administrators use to protect their environments can easily be exploited. Here’s how. No matter how many tools you buy or how many alerts flood the SOC, your security strategy is only as strong as its administration. If attackers ca…Continue Reading
. All kidding aside, anything you can do to make it harder for the bad guys to gain access to your network can have a positive impact on your overall security posture. That begs the question: with so many cyber security threats and attack methods to wo…Continue Reading
Researchers and several major tech companies this week disclosed the details of three new speculative execution side-channel vulnerabilities affecting Intel processors. The flaws, tracked as Foreshadow and L1 Terminal Fault (L1TF) , are CVE-2018-3615, …Continue Reading
BSides Manchester Websites can be compromised to turn their caches into exploit delivery systems. James Kettle of Portswigger, the firm behind Burp Suite , has developed hacking approaches to go beyond previous cache poisoning techniques. Caching is de…Continue Reading
DEF CON is known as a hacker conference, and it’s the place where researchers and security enthusiasts come to demonstrate and discuss different attack techniques and vulnerabilities. While offensive security operations have long been a focus for DEF C…Continue Reading
Mobile device malware may still be far behind when it comes to the prevalence of threats crafted for traditional PC systems, but threat actors are seeking ways to compromise these important devices we use on a daily basis.
Contact lists, online bankin…Continue Reading
The vast majority of successful breaches into corporate networks last year were caused by vulnerable web applications, according to a Kaspersky Lab analysis of penetration tests. Against a backdrop of increasingly-common remote and cloud-based working …Continue Reading
News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans.
Quttera launches first release of its cloud-based Web Application Firewall.