Security

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security…

9 years ago

Chinese state-sponsored hackers targets Russia and Belarus with ZeroT and PlugX

According to the firm ProofPoint, Chinese state-sponsored actors continues to spy on military and aerospace organizations in Russia and Belarus.…

9 years ago

Ransomware shutdown 70% of Washington DC CCTV ahead of President’s inauguration

A Ransomware attack compromised 70% of Washington DC CCTV ahead of inauguration of President Trump, technical staff wiped and rebooted…

9 years ago

WordPress 4.7.2 release addresses XSS, SQL Injection vulnerabilities

According to the release notes the latest version of Wordpress 4.7.2 addresses three security, including  XSS, SQL Injection flaws. The…

9 years ago

Business Driven Security: The Case of Building an Advanced Security Operations Centre

In the journey towards business-driven security one of the niche weapon is the roadmap to Advanced Security Operations Centre (ASOC).…

9 years ago

Possible Information warfare scenarios behind the Shamoon resurrection

The dreaded Shamoon has resurrected, which are possible political and technological scenarios behind the recent wave of attacks? The dreaded…

9 years ago

Gmail will stop allowing JavaScript (.js) file attachments starting February 13, 2017

Google announced Gmail will soon stop allowing users to attach JavaScript (.js) files to emails for obvious security reason. Google…

9 years ago

TorWorld helps you to manage a Tor node, promising an upcoming Tor-as-a-Service

The TorWorld initiative aims to build a community area for those people that desire to set up either a Tor…

9 years ago

A flaw in the Cisco WebEx Extension allows Remote Code Execution

Tavis Ormandy, a security expert at Google Project Zero, has discovered a critical remote code execution vulnerability in the Cisco WebEx…

9 years ago

Roughly 200,000 Devices still affected by the Heartbleed vulnerability

More than two years after the disclosure of the HeartBleed bug, 200,000 services are still affected. Systems susceptible to Heartbleed…

9 years ago

This website uses cookies.