Looking for silver linings in the CVE-2020-0601 crypto vulnerability

library used by more recent versions of Windows. The flaw, which also goes by the names Chain of Fools and Curveball, allows an attacker to fool Windows into believing that malicious software and websites have been digitally vouched for by one of the r…

Guangzhou China Enonomic Bidding Co Ltd XSS SQL Injection

################################################################### # Exploit Title : Guangzhou China Enonomic Bidding Co Ltd XSS SQL Injection # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 23/01/2020 # Ve…

It’s time to patch your Cisco security solutions again

has released another batch of security updates and patches for a variety of its offerings, including many of its security solutions. Security fixes for security solutions. Among the security holes plugged is CVE-2019-16028 , a critical authentication b…

#cybersecurity | #hackerspace | The State of Vulnerabilities in 2019

This year we slightly changed the vulnerability classification algorithm. The goal was to increase classification accuracy as well as to fit the vulnerabilities to the categories defined by OWASP in the best way possible. Such changes directly affected…

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

Cryptojacking definition. Cryptojacking is the unauthorized use of someone else’s computer …