Adobe has issued security updates to address critical and important security vulnerabilities in Flash Player and Experience Manager. The last Flash Player release 25.0.0.171 addresses seven vulnerabilities that can be exploited to take over vulnerable systems. According to the security advisory published by Adobe, the vulnerabilities include a use-after-free and other memory corruption flaws that can be […]
Locked Shields is the world’s largest and most advanced international technical live-fire cyber defence exercise organized by the NATO since 2010. Locked Shields is the world’s largest and most sophisticated international cyber defence exercise. It is an annual event since 2010, Locked Shields is organized by the NATO Cooperative Cyber Defence Centre of Excellence and […]
The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to national security. According to the telecommunications watchdog, Turkey has blocked the access to the online encyclopedia Wikipedia on Saturday, the Government has taken this decision citing a law that allows it to ban access to […]
Cryptology is the mathematical foundation of penetration testing and can be adopted as a resource for securing assets and communications. An overview of the science of the occult, that brings forth a new level of security in the age of digital privacy. Cryptology is the mathematical foundation of penetration testing and can be adopted as […]
The Israeli Government announces it thwarted a major cyberattack against 120 targets just days after harsh criticism of new cyber defense bill. According to haaretz.com, Israeli Government revealed it repelled a major cyberattack aimed at 120 targets. The unusual announcement was made by the Prime Minister’s Office (PMO) in a very unusual announcement on Wednesday. Israel […]
The United States Air Force has launched the ‘Hack the Air Force’ bug bounty program to test the security of its the networks and computer systems. I have discussed many times the importance and the numerous advantages of a bug bounty program. Bug bounties are very popular initiatives among the communities of white hats, principal companies, […]
(ISC)² delivered recommendations to White House urging prioritization on development of workforce for the final version of the cybersecurity executive order The nonprofit organization (ISC)² has issued a recommendation calling President Trump to develop workforce as a priority when he issued the final version of the cybersecurity executive order. The main goal is to tackle […]
Webroot home and business products are tagging Windows files and Facebook as malicious after a recent faulty update. Users are going crazy. The Webroot home and business defense solutions started tagging legitimate Windows and Facebook as malicious after a recent update. Many organizations claimed hundreds and even thousands of malfunctions to their endpoints, the glitch caused […]
The implementation of the NIST CyberSecurity Framework is of vital importance for the changes taking place in the landscape of zero-day threats The NIST CyberSecurity Framework is a guide for businesses and enterprises of good practices for information security. The NIST CyberSecurity Framework proposes a guide, which can adapt to each enterprise e for different […]
It started quietly as a probability not a reality. Now within months cyberwarfare has become a reality plausible as the air we breathe. The revelation of governments hacking units has brought light for a new domain of conflict: Cyberwarfare. Once a secret these government agencies were public revealed like the Equation Group as well as […]