Articles
More than 45 million medical scans are in the public domain
A study by CybelAngel, a risk management services company, helped identify a massive leak of confidential information . The aim of the study was...
Articles
New Kerberos Exploit for Bronze Bit attack Has Been Published
NetSPI security specialist Jake Karnes has published detailed information ( 1 , 2 ) about the CVE-2020-17049 vulnerability, as well as an exploit for it, calling his attack Kerberos Bronze...
Articles
Why Is It Important To Have Intrusion Detection And Prevention ?
This article describes why detection and prevention of burglaries must be one of the most important aspects of any burglary protection and detection system....
Articles
MASSCAN: Mass IP port scanner
This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, from a...
Articles
TLS Encryption at risk?
The Transport Layer Security (TLS) might just be not so secure thanks to new vulnerability that could potentially allow an attacker to break the...
Articles
Dell PowerEdge Server, trouble on the horizion?
Crisis averted for Dell PowerEdge servers, after a group of researchers disclosed details of a recently patched, high-severity flaw, which if exploited could allow...
Articles
Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !
Network vulnerability assessment analyzes a variety of network issues, prioritizes the most important (such as network security, network integrity, and network performance), and then...
Latest news
Microsoft Edge browser will warn users about “leaked” passwords
The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...
LastPass for Android found seven built-in trackers
German cybersecurity expert Mike Kuketz noticed that there are seven trackers in the LastPass app for Android that monitor users.
The researcher...
More than 400 phishing campaigns per week were associated with Valentine’s Day
Check Point experts report that hackers "celebrated" Valentine's Day in a big way. The company's analysts recorded more than 400 phishing campaigns...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Cobalt Strike sources uploaded to GitHub
An open repository was found on GitHub, the contents...
Sophos and ReversingLabs Introduce a Database with 20 Million Data for Information Security Researchers
Information security companies Sophos and ReversingLabs announced the release of the SoReL-20M database , which consists...
Embraer Data Leak; Hackers are already leaking data from the compromised company
As we said earlier, in late November, the aircraft giant Embraer,...