New: vulnerabilitiesAll contenthive-129948krhive-196917zzansteemhive-183959hive-185836hive-180932photographyhive-150122uncommonlabhive-101145hive-144064hive-166405hive-183397hive-188619bitcoinhive-145157krsuccesshive-193637hive-184714lifehive-181136hive-109690hive-103599TrendingNewHotLikersalexanderrogge (39)in cybersafetyreviewboard • 7 months agoGoogle Targets Microsoft’s Enterprise Security Weaknesses, Pitches Its Services to GovernmentLucas Nolan - Google Targets Microsoft’s Enterprise Security Weaknesses, Pitches Its Services to Government: #CyberSafetyReviewBoard #CSRB #Google #Microsoft #SingleSource #Cracking…nomik (70)in vulnerabilities • 8 months agoEmbracing the Unexplored world: Exploring Life's Vulnerabilities with FortitudeIn the tremendous breadth of the obscure, the hug of vulnerability arises as an extraordinary excursion — a conscious route through equivocalness, flightiness, and the purposeful making of a day to…tutorialboy (29)in cybersecurity • 2 years agoA Remote Code Execution in JXPath Library (CVE-2022-41852)Source :- On 6th October 2022 new CVE was released for critical vulnerability with the identifier CVE-2022-41852. This vulnerability affects a Java library called Apache Commons JXPath, which…jaichai (61)in coding • 2 years agosteemCreated with Sketch.(JaiChai) "Copy and Paste at your own peril.."*A rare, signed, higher resolution and non-watermarked version of this image is available for download at: Imitation is the sincerest form of flattery that mediocrity can pay to greatness. -…great-a (61)in hive-175254 • 3 years agoVulnerabilities in an OrganizationOrganization need to be prepared 24hours of a day for any security incident that occur, this security incidents that occurs can either cause a positive impact or negative impact on the growth and…yehey (63)in cybersecurity • 3 years agoFTC Bans Stalkerware App SpyFoneEmsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free. The SynAck ransomware gang launched its operation in 2017 but rebranded as…chiterok (25)in web • 4 years agoForging an e-mail letter is almostWhat is Email Authentication? For most of the past 40 years, users have had to take a leap of faith every time they opened their email. Do you think the letter really comes from whoever is listed…thepsychco (40)in infosec • 5 years ago2-19-2020_We_6.35pm_Information Security Risks Access Controls Mitigation Threats Warehouse Hierarchy Sources2-19-2020_We_6.35pm_Information Security Risks Controls Warehouse Hierarchy Sources Streamyard participate streamyard.com/m3i3sr9rh5 View www.youtube.com/watch?v=WRJtjU2DT-0doifeellucky (64)in infosec • 5 years agosteemCreated with Sketch.in part via threatpost.com: How to Secure Critical Infrastructure When Patching Isn’t Possible... by me... what you can learn from that!Author: Threatpost Mission-critical systems can’t just be switched off to apply security updates — so patching can take weeks if not years. By Amir Levintal, Infosec Insider Cyberattacks…doifeellucky (64)in infosec • 5 years agosteemCreated with Sketch.via threatpost.com: Pwn2Own Expands Into Industrial Control Systems HackingAuthor: Lindsey O'Donnell White-hat hackers will now have the chance to win $20,000 for sniffing out remote code-execution flaws in industrial control systems. Industrial control systems…solowhizkid (48)in dash • 5 years agoDash Releases Upgrade In Response to Newly Exposed VulnerabilitiesDash Releases Upgrade In Response to Newly Exposed Vulnerabilities #dash_forceilai (42)in cybersecurity • 5 years ago5 Important Tips for Software Vulnerability ManagementImage by TheDigitalArtist from Pixabay For the past three years, developers and security experts have been fighting a tsunami of vulnerabilities. Each year sets a new record of reported…doifeellucky (64)in share2steem • 5 years agodoifeellucky's twitter FeedExploring the Top 15 Most Common Vulnerabilities with HackerOne and GitHub: via @threatpost #share2steem #vulnerabilities #theluvbug #STEEM #infosec External Link : Exploring the Top 15…edaze (49)in serious • 5 years agoSerious vulnerabilities discovered in the game client Origin from Electronic ArtsCheck Point Research and CyberInt identified a number of defects in Electronic Arts ' Origin game customer. If exploited, the vulnerabilities might have resulted to the player's account being…tennthetech (25)in firefox • 6 years agoFirefox Vulnerability Puts Crypto Users at RiskArticle from the cryptopolitan highlights Firefox browser's vulnerabilities in the crypto worlddoifeellucky (64)in share2steem • 6 years agodoifeellucky's twitter FeedRisk & Repeat: Cisco vulnerabilities raise backdoor concerns via @searchsecurity #share2steem #cisco #vulnerabilities #huawei External Link : doifeellucky Posted from Twitter…wizmorebiz (26)in security • 6 years ago2-20-19_W_6.30pm_iNFO SYS_Blockchain, Crypto, Physical, Access, Communication Controls, Business Continuity PlanningSecurity, Threats, Contingency Plans, Indicators, Moving Avg, Physical, Access, Communication Controls, Business Continuity Planning2-20-19_W_6.30pm_iNFO SYS_Blockchain, Crypto, Physical, Access, Communication Controls, Business Continuity PlanningSecurity, Threats, Contingency Plans, Indicators, Moving Avg, Physical, Access…twr (53)in atlantiswordprocessor • 6 years agoCisco Discovered Multiple Vulnerabilities In Atlantis Word ProcessorAccording to a recent report, researchers from Cisco Talos discovered multiple security vulnerabilities in the Atlantis Word Processor. A number of versions of this portable word processor allegedly…twr (53)in cisco • 6 years agoCisco Patched Multiple Critical RCE Flaws in Webex Network Recording PlayerCisco has recently patched multiple vulnerabilities in the Webex Network Recording Player. Thanks to researchers from Trend Micro Zero Day Initiative who reported the flaws to Cisco. All the…spyder896 (48)in steemhunt • 6 years agoSaker - Saker - Tool for fuzz Web ApplicationsSaker Saker - Tool for fuzz Web Applications Screenshots Hunter's comment Open source python based tool for fuzz Web Applications. It can also find vulnerabilities. It also used for…