Lucene search

K

America's Army Security Vulnerabilities

packetstorm

0.5AI Score

2019-10-13 12:00 AM
226
packetstorm

0.4AI Score

2019-10-13 12:00 AM
184
packetstorm

1.1AI Score

2019-10-13 12:00 AM
163
packetstorm

0.4AI Score

2019-10-12 12:00 AM
172
packetstorm

0.2AI Score

2019-10-12 12:00 AM
237
packetstorm

0.3AI Score

2019-10-12 12:00 AM
168
packetstorm

0.2AI Score

2019-10-12 12:00 AM
158
packetstorm

0.5AI Score

2019-10-07 12:00 AM
215
packetstorm

0.5AI Score

2019-10-05 12:00 AM
430
packetstorm

0.1AI Score

2019-10-05 12:00 AM
381
kitploit
kitploit

Lockdoor Framework - A Penetration Testing Framework With Cyber Security Resources

Lockdoor Framework : A Penetration Testing Framework With Cyber Security Resources. 09/2019 : 1.0Beta Information Gathring Tools (21) Web Hacking Tools(15) Reverse Engineering Tools (15) Exploitation Tools (6) Pentesting & Security Assessment Findings Report Templates (6) Password Attack...

7.5AI Score

2019-10-02 11:59 AM
229
thn
thn

Pay What You Wish — 9 Hacking Certification Training Courses in 1 Bundle

The greatest threat facing most nations is no longer a standing army. It's a hacker with a computer who can launch a crippling cyber attack from thousands of miles away—potentially taking down everything from server farms to entire power grids with a few lines of code. So it should come as no...

0.2AI Score

2019-09-30 01:06 PM
114
thn
thn

WebARX — A Defensive Core For Your Website

Estonian based web security startup WebARX, the company who is also behind open-source plugin vulnerability scanner WPBullet and soon-to-be-released bug bounty platform plugbounty.com, has a big vision for a safer web. It built a defensive core for websites which is embedded deep inside the...

-0.2AI Score

2019-09-12 11:44 AM
30
kitploit
kitploit

Btlejack - Bluetooth Low Energy Swiss-army Knife

Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC Micro:Bit. devices running a dedicated firmware. You may also want to use an Adafruit's Bluefruit LE sniffer or a nRF51822 Eval Kit, as we added support for these devices....

7AI Score

2019-09-04 01:00 PM
162
threatpost
threatpost

How to Get a Handle on Patch Management

Patch management is a thankless job. Data shows, despite best efforts, that 80 percent of enterprise applications have at least one unpatched vulnerability in them, according research by Veracode. It is not for lack of trying that vulnerabilities persist. Last year 16,500 vulnerabilities were...

-0.3AI Score

0.975EPSS

2019-09-03 06:17 PM
314
packetstorm

0.2AI Score

2019-08-28 12:00 AM
672
packetstorm

AI Score

2019-08-28 12:00 AM
426
carbonblack
carbonblack

CB Customer Spotlight: Q&A with MEDNAX’s Don Cox

With over 30 years of experience in the technology landscape, Don Cox knows what it takes to be a leader in the industry. Currently residing as the CISO at MEDNAX, the physician-led healthcare organization headquartered in Sunrise, FL, Cox is responsible for cyber operations and engineering,...

AI Score

2019-08-26 05:30 PM
24
packetstorm

0.6AI Score

2019-08-26 12:00 AM
149
packetstorm

0.4AI Score

2019-08-26 12:00 AM
305
packetstorm

0.3AI Score

2019-08-26 12:00 AM
203
packetstorm

0.2AI Score

2019-08-26 12:00 AM
219
packetstorm

0.1AI Score

2019-08-22 12:00 AM
216
kitploit
kitploit

Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be uploaded via a simple browser-based...

6.8AI Score

2019-08-05 09:31 PM
668
carbonblack
carbonblack

Lessons from a CISO: 15 Ways to Do More with Less

This post originally appeared in Carbon Black's User Exchange Community. I’ve learned a ton of lessons over my years in the InfoSec world. I’ve made a lot of the right calls, but also a bunch of wrong ones. One of the lessons I have learned is how to operate in an environment of scarcity. This...

-0.5AI Score

2019-08-05 05:00 PM
40
threatpost
threatpost

For $8.6M, Cisco Settles Suit Over Bug-Riddled Video Surveillance Software

Cisco Systems has agreed to pay $8.6 million to settle a lawsuit that alleged it sold video security software with known security vulnerabilities to U.S. federal and state governments. The litigation, originally brought in 2011, was filed under the False Claims Act, claiming that the software...

AI Score

2019-08-01 02:20 PM
33
thn
thn

Cisco 'Knowingly' Sold Hackable Video Surveillance System to U.S. Government

Cisco Systems has agreed to pay $8.6 million to settle a lawsuit that accused the company of knowingly selling video surveillance system containing severe security vulnerabilities to the U.S. federal and state government agencies. It's believed to be the first payout on a 'False Claims Act' case...

0.7AI Score

0.006EPSS

2019-08-01 09:13 AM
52
ubuntu
ubuntu

SoX vulnerabilities

Releases Ubuntu 19.04 Ubuntu 18.04 ESM Packages sox - Swiss army knife of sound processing Details USN-4079-1 fixed vulnerabilities in SoX. This update provides the corresponding update for Ubuntu 18.04 LTS and Ubuntu 19.04. Original advisory details: It was discovered that SoX incorrectly...

5CVSS

5.8AI Score

0.002EPSS

2019-08-01 12:00 AM
39
ubuntu
ubuntu

SoX vulnerabilities

Releases Ubuntu 16.04 ESM Packages sox - Swiss army knife of sound processing Details It was discovered that SoX incorrectly handled certain MP3 files. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-8354, CVE-2019-8355, CVE-2019-8356,...

5CVSS

5.4AI Score

0.002EPSS

2019-07-30 12:00 AM
73
thn
thn

Learn Ethical Hacking From Scratch — 2019 Training Bundle

The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result. The only thing standing in the way of cybercrime is a small army of ethical hackers. These cybersecurity experts are employed to...

0.1AI Score

2019-07-23 01:57 PM
356
schneier
schneier

Science Fiction Writers Helping Imagine Future Threats

The French army is going to put together a team of science fiction writers to help imagine future threats. Leaving aside the question of whether science fiction writers are better or worse at envisioning nonfictional futures, this isn't new. The US Department of Homeland Security did the same...

0.4AI Score

2019-07-23 11:27 AM
57
cve
cve

CVE-2018-10531

An issue was discovered in the America's Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS...

7.5CVSS

7.4AI Score

0.001EPSS

2019-07-10 04:15 PM
30
nvd
nvd

CVE-2018-10531

An issue was discovered in the America's Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS...

7.5CVSS

7.5AI Score

0.001EPSS

2019-07-10 04:15 PM
prion
prion

Code injection

An issue was discovered in the America's Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS...

7.5CVSS

7.5AI Score

0.001EPSS

2019-07-10 04:15 PM
5
cvelist
cvelist

CVE-2018-10531

An issue was discovered in the America's Army Proving Grounds platform for the Unreal Engine. With a false packet sent via UDP, the application server responds with several bytes, giving the possibility of DoS amplification, even being able to be used in DDoS...

7.5AI Score

0.001EPSS

2019-07-10 03:32 PM
avleonov
avleonov

The most magnificent thing about Vulnerabilities and who is behind the magic

What I like the most about software vulnerabilities is how "vulnerability", as a quality of a real object (and the computer program is real), literally appears from nothing. Let's say we have a fully updated server. We turn it off, lock it in a safe and forget about it for half a year. Six...

1AI Score

2019-07-09 01:42 PM
72
threatpost
threatpost

Facebook Removes Accounts Used to Infect Thousands With Malware

Facebook has shut down more than 30 accounts spreading malware through malicious links that purport to be news about the ongoing political situation in Libya. The campaign, ongoing since 2014, has infected tens of thousands of victims with remote access trojans (RATs), according to researchers....

0.1AI Score

2019-07-01 08:19 PM
72
taosecurity
taosecurity

Reference: TaoSecurity Press

I started appearing in media reports in 2000. I used to provide this information on my Web site, but since I don't keep that page up-to-date anymore, I decided to publish it here. As of 2017, Mr. Bejtlich generally declines press inquiries on cybersecurity matters, including those on...

7AI Score

2019-07-01 12:00 PM
48
taosecurity
taosecurity

Reference: TaoSecurity News

I started speaking publicly about digital security in 2000. I used to provide this information on my Web site, but since I don't keep that page up-to-date anymore, I decided to publish it here. 2017 Mr. Bejtlich led a podcast titled Threat Hunting: Past, Present, and Future, in early July...

AI Score

2019-07-01 12:00 PM
50
securelist
securelist

How we hacked our colleague’s smart home

In this article, we publish the results of our study of the Fibaro Home Center smart home. We identified vulnerabilities in Fibaro Home Center 2 and Fibaro Home Center Lite version 4.540, as well as vulnerabilities in the online API. An offer you cannot refuse The backbone of any technology...

8.9AI Score

2019-07-01 09:00 AM
32
packetstorm

0.1AI Score

2019-06-20 12:00 AM
133
threatpost
threatpost

Telegram CEO Fingers China State Actors for DDoS Attack

The chief executive of secure messaging app Telegram is pointing the finger squarely at China as the culprit responsible for the distributed denial of service (DDoS) attack that it suffered on Wednesday. The company announced the attack on Twitter, warning that users may be experiencing connection....

0.1AI Score

2019-06-13 03:04 PM
146
packetstorm

AI Score

2019-06-13 12:00 AM
66
schneier
schneier

Chinese Military Wants to Develop Custom OS

Citing security concerns, the Chinese military wants to replace Windows with its own custom operating system: Thanks to the Snowden, Shadow Brokers, and Vault7 leaks, Beijing officials are well aware of the US' hefty arsenal of hacking tools, available for anything from smart TVs to Linux...

1.7AI Score

2019-06-06 12:04 PM
97
packetstorm

0.1AI Score

2019-06-05 12:00 AM
335
packetstorm

-0.5AI Score

2019-05-29 12:00 AM
171
nessus
nessus

Debian DLA-1808-1 : sox security update

Several issues were found in SoX, the Swiss army knife of sound processing programs, that could lead to denial of service via application crash or potentially to arbitrary code execution by processing maliciously crafted input files. For Debian 8 'Jessie', these problems have been fixed in version....

-0.4AI Score

0.002EPSS

2019-05-29 12:00 AM
11
packetstorm

-0.1AI Score

2019-05-29 12:00 AM
189
openvas
openvas

Debian: Security Advisory (DLA-1808-1)

The remote host is missing an update for the...

5CVSS

5.3AI Score

0.002EPSS

2019-05-29 12:00 AM
126
Total number of security vulnerabilities2063