Home Tags Protocol

Tag: Protocol

Forward-secrecy protocol comes with the 28th draft A much-needed update to internet security has finally passed at the Internet Engineering Task Force (IETF), after four years and 28 drafts.…
"Hacktivist" logged into a social media account from an IP address at GRU HQ in Moscow.
Firm that found flaw says un-patched RDP clients face lockout Black Hat Asia  Microsoft will soon prevent Windows from authenticating un-patched RDP clients to cap a March patch addressed a flaw that can allow lateral movement across a network from a c...
Attackers can use a protocol bug in Windows RDP to steal session authentication and take over a network domain.
In a victory for securing Web, anybody can now get a certificate valid for every site in a domain.
Attackers can exploit newly discovered critical crypto bug in CredSSP via a man-in-the-middle attack and then move laterally within a victim network.
At last yearrsquo;s Security Analyst Summit 2017 we predicted that medical networks would be a titbit for cybercriminals. Unfortunately, we were right.

The numbers of medical data breaches and leaks are increasing.

According to public data, this year is no exception.
A remote access Trojan, in use since 2016, has a new tactic: combining zip files with the SMB protocol to infect target systems.
The researchers at Kaspersky Lab ICS CERT decided to check the popular smart camera to see how well protected it is against cyber abuses.

This model has a rich feature list, compares favorably to regular webcams and can be used as a baby monitor, a component in a home security system or as part of a monitoring system.
There are three ways of doing things in the malware business: the right way, the wrong way and the way Brazilians do it.

From the early beginnings, using skimmers on ATMs, compromising point of sales systems, or even modifying the hardware of processing devices, Latin America has been a fertile ground for collecting credit and debit cards en masse.
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem communication channel through the Cisco 550X Series Stackable Managed Switches could allow an authenticated, remote attacker to cause the device to reload unexpectedly, caus...
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated pri...