New: vulnerabilitiesAll contenthive-129948hive-196917krsteemhive-183959hive-180932hive-166405photographyzzanuncommonlabhive-185836bitcoinhive-144064hive-188619hive-183397hive-150122krsuccesshive-124908hive-101145hive-139150hive-109690lifehive-145157hive-103599hive-150943TrendingNewHotLikersalexanderrogge (39)in cybersafetyreviewboard • 6 months agoGoogle Targets Microsoft’s Enterprise Security Weaknesses, Pitches Its Services to GovernmentLucas Nolan - Google Targets Microsoft’s Enterprise Security Weaknesses, Pitches Its Services to Government: #CyberSafetyReviewBoard #CSRB #Google #Microsoft #SingleSource #Cracking…nomik (69)in vulnerabilities • 7 months agoEmbracing the Unexplored world: Exploring Life's Vulnerabilities with FortitudeIn the tremendous breadth of the obscure, the hug of vulnerability arises as an extraordinary excursion — a conscious route through equivocalness, flightiness, and the purposeful making of a day to…tutorialboy (29)in cybersecurity • 2 years agoA Remote Code Execution in JXPath Library (CVE-2022-41852)Source :- On 6th October 2022 new CVE was released for critical vulnerability with the identifier CVE-2022-41852. This vulnerability affects a Java library called Apache Commons JXPath, which…jaichai (61)in coding • 2 years agosteemCreated with Sketch.(JaiChai) "Copy and Paste at your own peril.."*A rare, signed, higher resolution and non-watermarked version of this image is available for download at: Imitation is the sincerest form of flattery that mediocrity can pay to greatness. -…great-a (61)in hive-175254 • 3 years agoVulnerabilities in an OrganizationOrganization need to be prepared 24hours of a day for any security incident that occur, this security incidents that occurs can either cause a positive impact or negative impact on the growth and…yehey (63)in cybersecurity • 3 years agoFTC Bans Stalkerware App SpyFoneEmsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free. The SynAck ransomware gang launched its operation in 2017 but rebranded as…chiterok (25)in web • 4 years agoForging an e-mail letter is almostWhat is Email Authentication? For most of the past 40 years, users have had to take a leap of faith every time they opened their email. Do you think the letter really comes from whoever is listed…thepsychco (40)in infosec • 5 years ago2-19-2020_We_6.35pm_Information Security Risks Access Controls Mitigation Threats Warehouse Hierarchy Sources2-19-2020_We_6.35pm_Information Security Risks Controls Warehouse Hierarchy Sources Streamyard participate streamyard.com/m3i3sr9rh5 View www.youtube.com/watch?v=WRJtjU2DT-0doifeellucky (64)in infosec • 5 years agosteemCreated with Sketch.in part via threatpost.com: How to Secure Critical Infrastructure When Patching Isn’t Possible... by me... what you can learn from that!Author: Threatpost Mission-critical systems can’t just be switched off to apply security updates — so patching can take weeks if not years. By Amir Levintal, Infosec Insider Cyberattacks…doifeellucky (64)in infosec • 5 years agosteemCreated with Sketch.via threatpost.com: Pwn2Own Expands Into Industrial Control Systems HackingAuthor: Lindsey O'Donnell White-hat hackers will now have the chance to win $20,000 for sniffing out remote code-execution flaws in industrial control systems. Industrial control systems…solowhizkid (48)in dash • 5 years agoDash Releases Upgrade In Response to Newly Exposed VulnerabilitiesDash Releases Upgrade In Response to Newly Exposed Vulnerabilities #dash_forceilai (42)in cybersecurity • 5 years ago5 Important Tips for Software Vulnerability ManagementImage by TheDigitalArtist from Pixabay For the past three years, developers and security experts have been fighting a tsunami of vulnerabilities. Each year sets a new record of reported…doifeellucky (64)in share2steem • 5 years agodoifeellucky's twitter FeedExploring the Top 15 Most Common Vulnerabilities with HackerOne and GitHub: via @threatpost #share2steem #vulnerabilities #theluvbug #STEEM #infosec External Link : Exploring the Top 15…edaze (49)in serious • 5 years agoSerious vulnerabilities discovered in the game client Origin from Electronic ArtsCheck Point Research and CyberInt identified a number of defects in Electronic Arts ' Origin game customer. If exploited, the vulnerabilities might have resulted to the player's account being…tennthetech (25)in firefox • 5 years agoFirefox Vulnerability Puts Crypto Users at RiskArticle from the cryptopolitan highlights Firefox browser's vulnerabilities in the crypto worlddoifeellucky (64)in share2steem • 5 years agodoifeellucky's twitter FeedRisk & Repeat: Cisco vulnerabilities raise backdoor concerns via @searchsecurity #share2steem #cisco #vulnerabilities #huawei External Link : doifeellucky Posted from Twitter…wizmorebiz (26)in security • 6 years ago2-20-19_W_6.30pm_iNFO SYS_Blockchain, Crypto, Physical, Access, Communication Controls, Business Continuity PlanningSecurity, Threats, Contingency Plans, Indicators, Moving Avg, Physical, Access, Communication Controls, Business Continuity Planning2-20-19_W_6.30pm_iNFO SYS_Blockchain, Crypto, Physical, Access, Communication Controls, Business Continuity PlanningSecurity, Threats, Contingency Plans, Indicators, Moving Avg, Physical, Access…spyder896 (48)in steemhunt • 6 years ago4depcheck - 4depcheck - Vulnerabilities scanner4depcheck 4depcheck - Vulnerabilities scanner Screenshots Hunter's comment Open source website vulnerabilities scanner to find vulnerable dependencies/libraries from different…spyder896 (48)in steemhunt • 6 years agowhoUR Scanner - whoUR - Vulnerabilities scannerwhoUR Scanner whoUR - Vulnerabilities scanner Screenshots Hunter's comment Open source application for scanning sql vulnerable site using google search engine. Some of its features…spyder896 (48)in steemhunt • 6 years agoKekescan - Website vulnerabilities scannerKekescan Website vulnerabilities scanner Screenshots Hunter's comment Open source python script for scanning vulnerabilities in website. You have to just pass website URL for scan.…