General

Last Updated on 27 Nov. 2014, Total: 154 Blog Posts

  1. Vulnerability in Microsoft graphics component could allow remote code execution

    Microsoft is aware of a vulnerability in previous versions of Office that is actively exploited in targeted attacks using crafted Word documents sent by email. The vulnerability will not affect Office 2013 but will affect older versions such as Office 2003 and 2007... Read More

  2. Resolving Your PST Nightmares Once and for All!

    Join Microsoft MVP, J. Peter Bruzzese, and Sherpa Solutions Architect, Rick Wilson, on Thursday, November 14th, at1pm EST to explore the regulatory and operational challenges associated with managing PST files and gain insights into getting control of your organization's data once and for all... Read More

  3. Cisco IOS XR Software Route Processor Denial of Service Vulnerability

    Customers that are running version 4.2.1 or later of Cisco IOS XR Software, or that have previously installed the Software Maintenance Upgrades (SMU) for Cisco bug ID CSCtz62593 are not affected by this vulnerability... Read More

  4. PayPal Persistent Mail Encoding Vulnerability

    The Vulnerability Laboratory Research Team discovered an input validation mail encoding vulnerability in the official PayPal Inc (Ebay) MainStreet finance service company website... Read More

  5. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

  6. Can we learn from SCADA security incidents?

    Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software... Read More

  7. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  8. Routers default passwords online database

    RouterPasswords.com provides quick access for technicians to default passwords used on routers, default web logins, CCTV systems and other electronic devices... Read More

  9. API vulnerability in PayPal

    The Vulnerability Laboratory Research Team discovered a filter bypass & persistent web vulnerability in the official PayPal Inc Core Application API... Read More

  10. Obtaining remote root shell on a SOHO router

    This paper details the various strategies Zach pursued in search of an exploitable 0-day... Read More

Featured Links