AlmaLinux in the Cloud: Support and Management Best Practices

Management and support are key components for the efficient utilization of an operating system in cloud computing environments. Adopting security best practices like regular updates, disabling unnecessary services, and configuring firewalls are ...
WebLogic T3/IIOP Information Disclosure Vulnerability (CVE-2024-21006/CVE-2024-21007)

WebLogic T3/IIOP Information Disclosure Vulnerability (CVE-2024-21006/CVE-2024-21007)

Overview Recently, NSFOCUS CERT detected that Oracle has released a security announcement and fixed two information disclosure vulnerabilities (CVE-2024-21006/CVE-2024-21007) in Oracle WebLogic Server. Due to the defects of T3/IIOP protocol, unauthenticated attackers ...

Alert: Pixel Phones’ Exploited Android Zero-Day Flaw Patched

In the realm of smartphone security, the recent spotlight has fallen on Google Pixel devices, where two zero-day vulnerabilities have been unearthed and promptly addressed by Google. As per recent reports, the ...
MagicDot SafeBreach

MagicDot: A Hacker’s Magic Show of Disappearing Dots and Spaces

|
See how a SafeBreach Labs researcher discovered a set of vulnerabilities and unprivileged rootkit-like techniques leveraging a known issue within the Microsoft Windows DOS-to-NT path conversion process. The post MagicDot: A Hacker’s ...
It Takes a Hacker to Catch a Hacker 

It Takes a Hacker to Catch a Hacker 

| | Blog Posts
By Anonymous Hacker, Head of Incident Response   In a recent episode, 60 Minutes brought national attention to the growing threat of ransomware attacks, considered by many to be the greatest current threat ...
What is Clop Ransomware?

What is Clop Ransomware?

| | Cybersecurity
Reading Time: 5 min Clop ransomware is part of Cryptomix family that targets systems with security loopholes. Learn about Clop ransomware, its tactics andstrategies to fight back ...
Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

SOC teams frequently look to the IP geolocation to determine whether an alert or activity poses a genuine threat.  However, with the changing threat landscape, relying solely on this information is no ...
Unpacking 5 Risks in Generative AI

A Pandora’s Box: Unpacking 5 Risks in Generative AI

|
A Pandora's Box: Unpacking 5 Risks in Generative AI madhav Thu, 04/18/2024 - 05:07 Generative AI (GAI) is becoming increasingly crucial for business leaders due to its ability to fuel innovation, enhance ...

Palo Alto Networks PAN-OS Command Injection Vulnerability (CVE-2024-3400)

Overview Recently, NSFOCUS CERT detected that Palo Alto Networks issued a security announcement and fixed the command injection vulnerability (CVE-2024-3400) in PAN-OS. Since GlobalProtect gateway or portal configured in PAN-OS does not ...

Q&A With Axiad’s New Chief Product Officer: Alex Au Yeung

| | Announcements
Earlier this week we made an important announcement highlighting the appointment of two new executives... The post Q&A With Axiad’s New Chief Product Officer: Alex Au Yeung appeared first on Axiad ...