How the NSA snooped on encrypted Internet traffic for a decade
Enlarge (credit: NSA) In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have...
View ArticleWhat are YOU doing to give back to the security community?, (Sat, Aug 20th)
> has played a large role in helping us become inspired and motivated to develop as an information security practitioner.We certainly did not get where we are today on our own.Without a doubt, I...
View ArticleCisco ASA SNMP Remote Code Execution Vulnerability, (Sun, Aug 21st)
Looking back through all the vulnerabilities announced this week, one caught my eye. CVE-2016-6366 is a vulnerability in the Cisco ASA products which could allow a remote attacker to remotely execute...
View ArticleISC Stormcast For Monday, August 22nd 2016...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleBugtraq: [security bulletin] HPSBNS03635 rev.1 - HPE NonStop Servers OSS...
[security bulletin] HPSBNS03635 rev.1 - HPE NonStop Servers OSS Script Languages running Perl and PHP, Multiple Local and Remote Vulnerabilities
View ArticleBugtraq: Path traversal vulnerability in WordPress Core Ajax handlers
Path traversal vulnerability in WordPress Core Ajax handlers
View ArticleVuln: Oracle Java SE CVE-2016-3511 Local Security Vulnerability
Oracle Java SE CVE-2016-3511 Local Security Vulnerability
View ArticleVuln: WordPress CVE-2016-6897 Cross Site Request Forgery Vulnerability
WordPress CVE-2016-6897 Cross Site Request Forgery Vulnerability
View ArticleRed Team Tools Updates: hashcat and SpiderFoot, (Mon, Aug 22nd)
Two kits favored by red teams and penetration testers have been updated recently, namely hashcat and SpiderFoot. Hashcat and SpiderFoot together read like a Robert Redford/Paul Newman movie title...
View ArticleVuln: Oracle Java SE CVE-2016-3422 Remote Security Vulnerability
Oracle Java SE CVE-2016-3422 Remote Security Vulnerability
View ArticleVuln: Oracle Java SE CVE-2016-3443 Information Disclosure Vulnerability
Oracle Java SE CVE-2016-3443 Information Disclosure Vulnerability
View ArticleHints suggest an insider helped the NSA “Equation Group” hacking tools leak
This is not what NSA's TAO is doing right now. A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now...
View ArticleISC Stormcast For Tuesday, August 23rd 2016...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleVuln: PHP 'php_quot_print_encode()' Function Integer Overflow Vulnerability
PHP 'php_quot_print_encode()' Function Integer Overflow Vulnerability
View ArticleVuln: PHP 'php_url_encode()' Function Integer Overflow Vulnerability
PHP 'php_url_encode()' Function Integer Overflow Vulnerability
View ArticleVoice Message Notifications Deliver Ransomware, (Tue, Aug 23rd)
Bad guys need to constantly find new ways to lure their victims. If billing notifications were very common for a while, not all people in a company are working with such kind of documents. Which types...
View ArticleVuln: lshell Multiple Security Bypass Vulnerabilities
lshell Multiple Security Bypass Vulnerabilities
View ArticleVuln: Foxit Reader and Foxit PhantomPDF Out of Bounds Multiple Remote Code...
Foxit Reader and Foxit PhantomPDF Out of Bounds Multiple Remote Code Execution Vulnerabilities
View ArticleVuln: Foxit Reader and Foxit PhantomPDF Out of Bounds Read Information...
Foxit Reader and Foxit PhantomPDF Out of Bounds Read Information Disclosure Vulnerability
View Article