Overview Of Vulnerability Management

Overview Of Vulnerability Management

As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…

Read More
Email Remains The Biggest Vulnerability

Email Remains The Biggest Vulnerability, According To A Survey

Ever since email came into existence in the 1990s and the high level of awareness of the risks involved, 94% of the organizations surveyed said that it was still a…

Read More
Open EDR
What Is a SaaS Company Business Model and Benefits

What Is a SaaS Company Business Model and Benefits

We’ve often heard about it, but what is a SaaS company? SaaS means “Software as a Service,”so basically, this is an organization or a business that hosts a software that…

Read More
Bulgarian IT Expert Arrested For Revealing Vulnerability in Software

Bulgarian IT Expert Arrested For Revealing Vulnerability in Software

Bulgarian authorities arrested an IT expert for demonstrating a flaw in the security of the software used by local kindergartens. This vulnerability allows Petko Petrov to download details of 235,543…

Read More
Vulnerability in EA Origin Game Exposed Players to Hackers

Vulnerability in EA Origin Game Exposed Players to Hackers

Electronic Arts fixes security vulnerabilities in its Origin online gaming platform after security researchers found that they could trick gamers to remotely execute malicious code on their computers The flaw…

Read More
A Primer To The Nature Of Brute Force Attacks

A Primer To The Nature Of Brute-Force Attacks

Brute-force attack cases are considered to be “password list attacks” using a list of leaked IDs and passwords at another site. There are many cases where there is a problem…

Read More
Evernote Critical Flaw Could Have Impacted Millions of Users

Evernote Critical Flaw Could Have Impacted Millions of Users

A critical flaw that affected Evernote’s web clipper extension for Chrome could have impacted millions of users. Reports say that the critical flaw in the popular note-taking extension Evernote could…

Read More
RAMBleed Attack Can Not Just Alter But Steal Sensitive Data

RAMBleed Attack Can Not Just Alter But Steal Sensitive Data

Researchers discovered a new security vulnerability that affects the confidentiality of data stored in computer memory. This enabled them to successfully extract a signature key with the usual user permissions…

Read More
Microsoft Warns Users About Ongoing Email Spam Campaign

Microsoft Warns Users About Ongoing Email Spam Campaign

Microsoft warns users about an ongoing email spam campaign that abuses an Office vulnerability and seems to target European users. The malware, it is reported, is spread through infected RTF…

Read More
NFC Vulnerability May Promote Ghost Screen Taps

NFC Vulnerability May Promote Ghost Screen Taps

Convenience vs Security, that is the frequently recurring theme when it comes to cybersecurity nowadays. Every time a new technology opens its doors to more convenience is when it becomes…

Read More

Page 2 of 15

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register