Attack on Vermont Medical Center is costing the hospital $1.5M a day
The attack that hit the University of Vermont Medical Center at the end of October is costing the hospital about $1.5 million...
The attack that hit the University of Vermont Medical Center at the end of October is costing the hospital about $1.5 million...
The European Medicines Agency (EMA) announced it has been targeted by a cyber attack. The European Medicines Agency (EMA) announced...
RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding...
Depix is a tool for recovering passwords from pixelized screenshots. This implementation works on pixelized images that were created with...
Just using InsightAppSec and still want access to the new executive reports? Don’t worry—we have you covered. Check out your...
Security researchers have uncovered a new technique to inject a software skimmer onto websites, the malware hides in CSS files....
Microsoft December 2020 Patch Tuesday security update address 58 vulnerabilities, 22 of them are remote code execution vulnerabilities. Microsoft December...
The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing...
The Apache Software Foundation addressed a possible remote code execution vulnerability in Struts 2 related to the OGNL technology. The...
The cyber security giant FireEye announced that it was hacked by nation-state actors, likely Russian state-sponsored hackers. The cybersecurity firm...
The OpenSSL Project disclosed a serious security vulnerability in TLS/SSL toolkit that exposes users to denial-of-service (DoS) attacks. The OpenSSL...
With the popularity of web front-end packaging tools, have you encountered more and more websites represented by Webpack packager in...
Static analysis to search for vulnerabilities in Wordpress plugins. __ ____________ ___ ___ __ / / ______ / | __...
We close off our 2020 year of Patch Tuesdays with 58 vulnerabilities being addressed. While it's a higher count than...
Penetration testing (“pentesting”) is the practice of simulating a criminal breach of a sensitive area in order to uncover and...
Russian citizen Alexander Vinnik was sentenced in Paris to five years in prison for money laundering and ordered to pay 100,000...
Security expert disclosed technical details about a wormable, cross-platform flaw in Microsoft Teams that could allow stealth attacks. Security researcher...
Security flaws in the PlayStation Now cloud gaming Windows application allowed hackers to execute arbitrary code on Windows systems. Bug bounty...
Network-attached storage (NAS) vendor QNAP addressed vulnerabilities that could enable attackers to take over unpatched NAS devices. The Taiwanese vendor...
Electronics contract manufacturer Foxconn is the last victim of the DoppelPaymer ransomware operators that hit a Mexican facility. DoppelPaymer ransomware operators...
Cisco released security updates to fix multiple pre-authentication RCE flaws with public exploits affecting Cisco Security Manager. Cisco has released security updates...
This is a proof of concept of how a ransomware works, and some techniques that we usually use to hijack...
JavaScript AST analysis. This package has been created to export the Node-Secure AST Analysis to enable better code evolution and...
Thank you all that participated in the 2020 December Metasploit community CTF! The four day CTF was well received by...