Security News
A recently addressed vulnerability in the Cobalt Strike penetration testing platform could be exploited to identify attacker servers, Fox-IT security researchers reveal. read more
A company with access to the Dow Jones Watchlist of risky people and businesses left it on a public AWS server without a password.
An extraneous space in the HTTP responses of webservers run by a variety of malicious actors allowed Fox-IT researchers to identify them pretty easily for the past year and a half. This was...
'Authorized Third Party' Responsible for Leak, Company SaysAn "authorized third party" exposed a Dow Jones database with more than 2.4 million records of risky businesses and individuals on a...
Intel and its partners this week made several cybersecurity-related announcements, including the launch of new silicon-enabled products and tools. read more
StrongKey, the leading provider of cryptographic key management solutions, announced the availability of a free, open-source FIDO server so developers can easily integrate passwordless...
Malicious actors could plant firmware backdoors on bare metal cloud servers and use them to disrupt applications, steal data, and launch ransomware attacks, firmware security company Eclypsium...
Jack Wallen walks you through the process of installing the open source security audit tool, OpenVAS, on the Ubuntu Server platform.
SSH has a lot of tricks up its sleeve, one of which is the ability to copy files between two remote servers. Jack Wallen shows you how.
Overzealous use of HTTP/2 flow control settings in IIS could have brought servers to their knees.