Cisco released patches for 34 vulnerabilities affecting multiple products that include 5 critical vulnerabilities, 20 High severity vulnerabilities and 9 medium level vulnerabilities. Critical Vulnerabilities Cisco patched 5 critical Vulnerabilities…
Pulse Wave Heavy DDoS Attack to Take Down Multiple Protected Target Networks
A new method of DDOS attack called Pulse wave emerging as a nightmare for DDOS protection solutions. With this method, attackers can bring down systems that previously thought to be…
FakeSpy – Android Information Stealing Malware Attack to Steal Text Messages, Call Records & Contacts
Cyber criminals spreading new Android Malware called FakeSpy to compromise the infected Android users to stealing text messages, account information, contacts, and call records. FakeSpy using SMS as an entry…
Artificial Intelligence & the Security Market
A glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs.
SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing Tool
Sn1per is an automated scanner that can automate the process of collecting data for the exploration and penetration testing. In their work sn1per involves such well-known tools like: amap, arachni,…
Click2Gov Breaches Attributed to WebLogic Application Flaw
At least 10 US cities running Click2Gov software have alerted citizens to a data breach, but it turns out the problem was in the application server.
Better Biometrics in Android P
Posted by Vishwath Mohan, Security Engineer [Cross-posted from the Android Developers Blog] To keep users safe, most apps and devices have an authentication mechanism, or a way to prove that…
Templates: The Most Powerful (And Underrated) Infrastructure Security Tool
If your team is manually building cloud instances and networks for every application, you’re setting yourself up for a data breach.
Don’t download it! Fake Fortnite app ends in malware…
Epic Games is on the verge of releasing Fortnite for Android – so the crooks are jumping in to offer you “early access”… to malware!
Microsoft Office: The Go-To Platform for Zero-Day Exploits
Malicious Office documents are the weapon of choice among cybercriminals, who use files to access remotely hosted malicious components.