Vulnerabilities
Eating Our Own Cooking at Contrast: Securing and Protecting TeamServer
It’s very rare that one has an opportunity to experience the development of a major software solution from the ground up and use that very product to secure and protect it at ...
25 CVEs That NSA Want You to Patch Right Now
Tuesday, October 20th, wasn’t your usual Patch Tuesday announcement from Microsoft. Instead, this announcement came from the NSA urging users to patch 25 vulnerabilities Chinese hackers were exploiting, quickly. The list of ...
25 CVEs That NSA Wants You to Patch Right Now
Tuesday, October 20th, wasn’t your usual Patch Tuesday announcement from Microsoft. Instead, this announcement came from the NSA urging users to patch 25 vulnerabilities Chinese hackers were exploiting, quickly. The list of ...
The Big Lie in Threat Hunting
Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...
The Big Lie in Threat Hunting
Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...
Crane lifting Scala onto Code Property Graph to conduct vulnerability analysis
Image Courtesy : https://www.huismanequipment.com/The Scala language has continued to gain popularity over the last several years, thanks to its excellent combination of functional and object-oriented software development principles, and its implementation on top ...
BleedingTooth: Intel Discloses Early, Angering Linux Lovers
A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack ...
VERT Threat Alert: October 2020 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s October 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-909 on Wednesday, October 14th. In-The-Wild & Disclosed CVEs CVE-2020-16938 ...
Akamai and Snyk Partnership Creates a Powerful Combination for In-Browser Script Protection
A web experience begins with the sum of the code you created. But it also includes all the code the user is put in contact with when loading your website. This means ...
Xplora Watches for Kids: Chinese Spyware
Chinese smartwatches for kids: Just one of this decade’s objectively terrible ideas ...
