Vulns & Alerts
April 10, 2014 Added by:Dan Dieterle
The Internet is plastered with news about the OpenSSL heartbeat “Heartbleed” (CVE-2014-0160) vulnerability that some say affects up to 2/3 of the Internet.
April 09, 2014 Added by:Scott Montgomery
Whether you want to acknowledge it or not, the Windows XP and 2003 applications and servers in your estate are going to be at significant risk in a few weeks.
April 09, 2014 Added by:Tripwire Inc
Estimates are over 66% of active websites on the internet may be vulnerable to this bug, found in OpenSSL, an open source cryptographic library used in the Apache web server and ignx when creating communications with users.
March 19, 2014 Added by:Tripwire Inc
In addition to being one of the top SANS Critical Security Controls and part of numerous other compliance frameworks, vulnerability management is generally accepted as basic security hygiene today for corporate networks.
March 19, 2014 Added by:Joel Langill
One very important part of a well-rounded ICS Security Management System is situational awareness of the actual risks facing industrial systems in terms of both vulnerabilities disclosed and the ease in converting these proof-of-concept (PoC) disclosures into workable exploit modules.
March 17, 2014 Added by:Joe Weiss
I believe the only means for cyber threats to cause long term and wide-spread grid failure is through compromising the control systems of facilities leading to physical damage of long-lead time critical equipment such as transformers and turbines.
March 17, 2014 Added by:Dan Dieterle
According to defense officials, starting in 2007 Chinese hackers were involved in a massive, multi-year cyber espionage program dubbed, 'Operation Byzantine Hades', that targeted foreign governments and industry.
March 14, 2014 Added by:Wayde York
The press has come out with the fact that Target received a warning about malware and hacking before 40 million credit cards were compromised. While we should not string up the security analysts at Target, we may have to spank their managers.
March 13, 2014 Added by:Pierluigi Paganini
The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign.
February 21, 2014 Added by:Mike Lennon
Apple has released iOS 7.0.6 which patches a flaw in iOS that enables a man-in-the-middle attack of encrypted (SSL) connections
February 20, 2014 Added by:Rob Fuller
Over the years of doing DNS record collection I have noticed one thing, most domains have a large number of short hostnames that are easy to remember, usually 4 characters or less. I’m sure you already know where I’m going with this, I wanted to brute force all possible hostnames up to 4 characters.
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-18-2014
Is User Experience Part of Your Security Pla... Allan Pratt, MBA on 04-17-2014
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-17-2014