1) Path traversal Description. The vulnerability allows a remote attacker to obtain potentially sensitive information. The weakness exists due to path traversal in the web interface on D-Link routers. A remote attacker can send a /.. or // after “GET /…Continue Reading
This slew of rather grim news always comes with just a few lessons learned and many recurring motifs. Let me break it down: Third-party vendors – Not a lot of information was made available due to pending investigation, but the DoD breach was due to si…Continue Reading
Our paper “Threat Intelligence Computing” presents a concrete realization of TIC through the design and implementation of a domain-specific language τ-calculus with a specialized graph database and peripheral systems. We’ll present it at the 25th ACM C…Continue Reading
When it comes to protecting yourself and your organization against cyber scams, there’s no “one-size-fits-all” solution. As organizations and people alike continue to adopt new devices and technology, they’re opening themselves up to more opportunities…Continue Reading
Oracle has released its Critical Patch Update for October 2018, fixing 301 vulnerabilities across a wide range of its products, including Oracle Database Server, Oracle E-Business Suite, Oracle Java SE, and others.
“As with previous Critical Patch Upd…Continue Reading
Leaked data tranche of 8,700 documents purportedly includes tools that turn smart TVs into covert surveillance devices.
In what appears to be another major blow against a U.S. intelligence agency, whistleblower website WikiLeaks has publicly leaked 8,…Continue Reading
A vulnerability in libssh, a popular library for supporting the Secure Shell (SSH) authentication protocol, leaves thousands, if not more, of enterprise servers open to attacks. The vulnerability allows an attacker to bypass authentication procedures a…Continue Reading
Researchers have found several vulnerabilities that can be exploited to take full control of some D-Link routers, and patches do not appear to be available. Serious flaws have also been discovered in routers from Linksys. The security holes affecting D…Continue Reading
The cybersecurity landscape is changing daily as hackers continue to find ways to circumvent the latest technologies, presenting threats that could jeopardize the existence of your organization with the click of a mouse. As the persistence and sophisti…Continue Reading
As someone who has built IT security companies from the ground up and dealt with the growing issue of malware for well over 15 years now, the last thing I expected when I started my current company is that I would have to become somewhat of a Krem…Continue Reading