Application Security

CCleaner Performance Optimization Comes with a Side of System Compromise

Anyone who has used a computer running the Windows operating system knows that performance seems to deteriorate over time, and it can be helpful to clean things up and optimize the system every once in a while. CCleaner is a popular free software product developed for just that purpose. Unfortunately, it seems CCleaner itself...

Read More

New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that's even more difficult to identify. The post New phishing scam targets Office 365 users appeared first on Health Security...

Read More

VMworld 2017 Europe Briefing: VMware Enhances Multiple Cloud Management in VRealize Suite 2017

Check out the latest enhancements to VMware vRealize Suite 2017 VMware’s updated vRealize Suite provides enhancements to extend their virtualization management capabilities from on-premise across multiple clouds providing intelligent operations, better automation and support for DevOps-ready IT. read...

Read More

AWS Penetration Testing Part 2 – S3, IAM, EC2

Penetration Testing AWS Services AWS Penetration Testing Part 2. S3, IAM, EC2 S3 and IAM Policies Unlike ACLs and bucket policies, IAM policies are targeted at IAM users/groups instead of S3 buckets and objects. Using an IAM policy, we can give an IAM user limited access to S3 resources (or any AWS service in general). More posts like this can be found at Virtue...

Read More