Vulns & Alerts

E595c1d49bf4a26f8e14ce59812af80e

Government Network Security Failures Led to Remote Access Breaches

July 07, 2014 Added by:Patrick Oliver Graf

Former NSA director Keith Alexander pointed out earlier this week that government networks are far from secure, as the NSA and the Department of Defense uncovered more than 1,500 pieces of malware on the U.S. government’s most secret networks.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

It’s the end of June 2014 and ICS Cyber Security is Still an Enigma to Many

July 02, 2014 Added by:Joe Weiss

The past two weeks continue to demonstrate the lack of understanding about the unique issues of ICS cyber security – why isn’t it just IT.

Comments  (1)

B8db824b8b275afb1f4160f03cd3f733

What’s the Best Tool for the Job?

June 24, 2014 Added by:Jack Daniel

I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses. That reminded me of a lesson about tools I learned many years ago.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

ICSs and the Internet – What is Actually Happening

June 11, 2014 Added by:Joe Weiss

The story is that MANY ICSs are connected to the Internet and it isn’t expensive to find them.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

BYOD and Its Risks to Network Security

June 05, 2014 Added by:Patrick Oliver Graf

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

The Electric Industry Still Doesn't Understand What Sophisticated Attackers Are After

May 21, 2014 Added by:Joe Weiss

Stuxnet and Aurora utilized design features of the system or controllers to attack physical systems. Stuxnet and Aurora are not traditional network vulnerabilities and cannot be found or mitigated by using traditional IT security techniques.

Comments  (3)

Ffc4103a877b409fd8d6da8f854f617e

New IE Zero-Day Used in Attacks Against Defense, Financial Sectors

April 27, 2014 Added by:InfosecIsland News

Researchers from FireEye have discovered a nasty zero-day exploit that bypasses the ASLR and DEP protections in Microsoft Windows and is being used in targeted attacks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Stop the Bleeding: How Enterprises Can Address the Heartbleed Bug

April 21, 2014 Added by:Patrick Oliver Graf

If your provider is not hurrying to patch the hole in their OpenSSL implementation and/or taking steps to better implement a defense in depth framework, you may be justified in hitting the panic button.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

OpenSSL “Heartbleed” – Whose Vulnerable and How to Check

April 10, 2014 Added by:Dan Dieterle

The Internet is plastered with news about the OpenSSL heartbeat “Heartbleed” (CVE-2014-0160) vulnerability that some say affects up to 2/3 of the Internet.

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

OpenSSL Problem is HUGE – PAY ATTENTION

April 10, 2014 Added by:Brent Huston

The attack allows an attacker to remotely tamper with OpenSSL implementations to dump PLAIN TEXT secrets, passwords, encryption keys, certificates, etc. They can then use this information against you.

Comments  (0)

23712318a400454a2c049f165106d985

Windows XP End of Life: What Your Organization Can Expect

April 09, 2014 Added by:Scott Montgomery

Whether you want to acknowledge it or not, the Windows XP and 2003 applications and servers in your estate are going to be at significant risk in a few weeks.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Heartbleed Should Give You Cardiac Arrest

April 09, 2014 Added by:Tripwire Inc

Estimates are over 66% of active websites on the internet may be vulnerable to this bug, found in OpenSSL, an open source cryptographic library used in the Apache web server and ignx when creating communications with users.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Here's Full Disclosure - Now No Disclosure

March 20, 2014 Added by:Javvad Malik

Full disclosure has announced it’s shutting down.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Adapting Vulnerability Management to Address Advanced Persistent Threats

March 19, 2014 Added by:Tripwire Inc

In addition to being one of the top SANS Critical Security Controls and part of numerous other compliance frameworks, vulnerability management is generally accepted as basic security hygiene today for corporate networks.

Comments  (0)

7b072d611db66025d89ff3137dcddfb3

Recent Development of ICS Exploits Continues Upward Trend of Security Research

March 19, 2014 Added by:Joel Langill

One very important part of a well-rounded ICS Security Management System is situational awareness of the actual risks facing industrial systems in terms of both vulnerabilities disclosed and the ease in converting these proof-of-concept (PoC) disclosures into workable exploit modules.

Comments  (0)

37c1b0270687e8148e56508e805f8b8e

The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »