Summary

Total Articles Found: 13

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Two thirds of Android antimalware apps are ineffective or unreliable
  • Windows Servers in danger of being compromised via WDS bug
  • Faction: Open-source pentesting report generation and collaboration framework
  • "Serious" vulnerability found in Libgcrypt, GnuPG's cryptographic library - Help Net Security
  • Potential Apache Struts 2 RCE flaw fixed, PoCs released - Help Net Security
  • USB armory Mk II: A secure computer on a USB stick featuring open source hardware design - Help Net Security
  • Wuhan coronavirus exploited to deliver malware, phishing, hoaxes - Help Net Security
  • PHP RCE flaw actively exploited to pop NGINX servers - Help Net Security
  • Vulnerability in Cisco Webex and Zoom may expose online meetings to snooping - Help Net Security
  • German banks to stop using SMS to deliver second authentication/verification factor - Help Net Security

Faction: Open-source pentesting report generation and collaboration framework

Published: 2024-02-01 02:29:34

Popularity: None

Author: Mirko Zorz

Faction is an open-source solution that enables pentesting report generation and assessment collaboration.

...more

"Serious" vulnerability found in Libgcrypt, GnuPG's cryptographic library - Help Net Security

Published: 2021-01-29 14:12:43

Popularity: None

Author: None

🤖: "Crypto alert!"

Libgcrypt 1.9.0, the newest version of a cryptographic library integrated in GnuPG has a "severe" security vulnerability and should not be used.

...more

Potential Apache Struts 2 RCE flaw fixed, PoCs released - Help Net Security

Published: 2020-08-18 13:26:23

Popularity: None

Author: None

🤖: ""Struts hacked again ""

Information about a potential Apache Struts 2 RCE vulnerability (CVE-2019-0230) and PoC exploits for it have been published.

...more

USB armory Mk II: A secure computer on a USB stick featuring open source hardware design - Help Net Security

Published: 2020-02-05 13:49:03

Popularity: None

Author: None

🤖: ""Stick it in""

The USB armory Mk II is suitable for a wide range of applications that need an embedded computer without sacrificing security.

...more

Wuhan coronavirus exploited to deliver malware, phishing, hoaxes - Help Net Security

Published: 2020-02-03 16:04:55

Popularity: None

Author: None

🤖: "coronavirus hack"

Malicious individuals and groups are exploiting the Wuhan coronavirus panic to spread fake news, malware and phishing emails.

...more

PHP RCE flaw actively exploited to pop NGINX servers - Help Net Security

Published: 2019-10-28 17:57:19

Popularity: None

Author: None

🤖: "Server pwned"

A recently patched vulnerability (CVE-2019-11043) in PHP is being actively exploited by attackers to compromise NGINX web servers.

...more

Vulnerability in Cisco Webex and Zoom may expose online meetings to snooping - Help Net Security

Published: 2019-10-01 17:19:57

Popularity: None

Author: None

🤖: ""Snoopy alert""

Cequence Security’s CQ Prime Threat Research Team discovered of a vulnerability in Cisco Webex and Zoom video conferencing platforms that potentially

...more

German banks to stop using SMS to deliver second authentication/verification factor - Help Net Security

Published: 2019-07-12 15:42:59

Popularity: None

Author: None

🤖: "Two-factor fail"

German banks are moving away from SMS-based customer authentication and transaction verification (SMS-TAN), as the method is deemed to be too insecure.

...more

Two thirds of Android antimalware apps are ineffective or unreliable

Published: 2019-03-14 12:12:54

Popularity: 236

Author: Zeljka Zorz

Keywords:

  • Don't miss
  • Featured news
  • News
  • Android
  • antivirus
  • Google Play
  • mobile apps
  • mobile security
  • product testing
  • report
  • Choosing an effective Android antimalware app is a shot in the dark for many users and they may end up in more danger of malicious apps, not less. In fact, as the results of AV-Comparatives’ latest test of Android antimalware apps has shown, only 80 of the 250 security apps tested detected over 30 percent of malicious apps and had no false positives, and only 50 achieved detection rates from 90 to 100 percent. The … More → The post Two thirds of Android antimalware apps are ineffective or unreliable appeared first on Help Net Security.

    ...more

    Windows Servers in danger of being compromised via WDS bug

    Published: 2019-03-07 13:49:00

    Popularity: 129

    Author: Zeljka Zorz

    Keywords:

  • Don't miss
  • Featured news
  • News
  • Check Point
  • vulnerability
  • Windows Server
  • 🤖: "windows crashed"

    Checkpoint has released more details about CVE-2018-8476, a critical remote code execution vulnerability affecting all Windows Servers since 2008 SP2. The bug was responsibly disclosed to Microsoft last year and was fixed last November, but there are likely still servers out there that haven’t been upgraded and are open to attack. About the vulnerability CVE-2018-8476 exists in the way that Windows Deployment Services (WDS) TFTP Server handles objects in memory. WDS is a popular Windows … More → The post Windows Servers in danger of being compromised via WDS bug appeared first on Help Net Security.

    ...more

    Mozilla will fund code audits for open source software - Help Net Security

    Published: 2019-03-07 23:49:30

    Popularity: None

    Author: None

    The Mozilla Foundation has set up the Secure Open Source Fund, whose aim is to help open source software projects get rid their code of vulnerabilities.

    ...more

    The psychological reasons behind risky password practices - Help Net Security

    Published: 2019-03-07 23:31:08

    Popularity: None

    Author: None

    When it comes to online security, personality type does not inform behavior, but it does reveal how consumers rationalize poor password habits.

    ...more

    Damn Vulnerable UEFI: Simulate real-world firmware attacks

    Published: 2024-09-03 22:11:30

    Popularity: None

    Author: Help Net Security

    🤖: "Firmware fail"

    Damn Vulnerable UEFI (DVUEFI) is an open-source exploitation toolkit and learning platform that enables you to simulate firmware attacks.

    ...more

    end