Alphabet Launches Cyber Security Product Called Backstory 1

Alphabet Launches Cyber Security Product Called Backstory

Alphabet’s Chronicle, the cybersecurity owes its inception to X (formerly Google X), launched its first product — a security data platform called Backstory. Backstory gives security analysts the ability to…

Read More
Important Features of Vulnerability Scanners

Important Features of Vulnerability Scanners

To identify vulnerabilities that can compromise your security, performance, or functionality, you need to have a vulnerability assessment in place. It is a method used by a qualified provider of…

Read More
Open EDR
Hackers Are Going After Cisco RV110 RV130 and RV215 Routers

Hackers Are Going After Cisco RV110, RV130, and RV215 Routers

Cybercriminals always look for vulnerabilities in routers, and if they find one, it becomes an easy target for them. We have seen how the hackers were not only scratching the…

Read More
Implementing Operational Security The Process and Best Practices

Implementing Operational Security, The Process and Best Practices

procedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw…

Read More
Vulnerability Helps Researchers Expose Malware CC Servers

Vulnerability Helps Researchers Expose Malware C&C Servers

We usually get to hear of vulnerabilities that cybercriminals exploit to expose or steal data. This time it’s the other way around; the criminals are at the receiving end. A…

Read More
University of Washington Medicine Mistakenly Exposes Data

University of Washington Medicine Mistakenly Exposes Data

Medical files, containing personal data of patients of University of Washington Medicine, were mistakenly exposed following a data error. UW Medicine, in a press release dated February 20, 2019, has…

Read More
Facebook’s CSRF Vulnerability Allows Attackers To Hijack Accounts

Facebook’s CSRF Vulnerability Allows Attackers To Hijack Accounts

A fatal cross-site request forgery (CSRF) vulnerability on Facebook was discovered by a security researcher, and interestingly it allowed hackers to take over Facebook accounts with a simple one-click on…

Read More
Pen Testing As A Growing Industry For Good Hackers

Pen Testing As a Growing Industry for Good Hackers

We often hear it. A Bank X was hacked. Social Media Site Z became a victim of a data breach. Celebrity Y was hacked, and we knew who she had…

Read More
Attackers Gain Root Access on Linux Systems via Dirty Sock Vulnerability

Attackers Gain Root Access on Linux Systems via Dirty Sock Vulnerability

An article on ZedNet reads how a security researcher published proof-of-concept (PoC) code for a vulnerability impacting Ubuntu and other Linux distros. Canonical, the parent company of Ubuntu operating system,…

Read More
Virtual Patching vs Unpatched Vulnerabilities Unleashed by Trend Micro

runC Major Security Flaw Patched At Record Time, All Container Admins Expected To Update

A major security flaw under CVE-2019-05736 that has affected runC is now patched, thanks to the hard work of its developers. The vulnerability enabled a guest container’s root privileges to…

Read More

Page 5 of 15

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register