Last Updated on 6 Oct. 2015, Total: 92 Blog Posts

  1. OWA Webmail Server Attack

    A New Persistent Attack Methodology Targeting Microsoft Outlook Web Application (OWA)... Read More

  2. The Changing Role of the Risk Manager

    Influence of Risk Managers is growing but more Futurists and Innovators needed, says new ACE report... Read More

  3. VMware vCenter and ESXi updates address critical security issues

    VMware ESXi contains a double free flaw in OpenSLP's SLPDProcessMessage() function. Exploitation of this issue may allow an unauthenticated attacker to execute code remotely on the ESXi host... Read More

  4. Windows 10 Core Privacy Principles

    Microsoft’s Terry Myerson says that no other company is more committed, more transparent and listening harder to customers on Privacy than Microsoft... Read More

  5. 7 years of Russian cyberespionage

    The Dukes are a well-resourced, highly dedicated and organized cyberespionage group... Read More

  6. The Web’s Shadiest Neighbourhoods

    Blue Coat Reveals the Web's Shadiest Neighborhoods... Read More

  7. Office malware creation kit revealed

    It seems that some cyber gangs are learning that less really can be more... Read More

  8. Freeware automation tool leveraged by targeted attacks

    Phishing attacks are a serious threat that users and organizations face every day... Read More

  9. Leveraging Microsoft SMB protocol to create a new attack vector

    Security researches at the Black Hat USA 2015 conference in Las Vegas, explain how an extension of Microsoft Server Message Block (SMB) attacks allows credentials theft and user impersonation from the internet... Read More

  10. File synchronization services can be easily turned into an infrastructure for endpoint compromise

    Security researchers from the Imperva Hacker Intelligence Initiative demonstrate a new type of attack referred to as “Man in the Cloud” (MITC)... Read More

Featured Links