Frontline Sentinel
Cyber Security Advisory - Privacy - Digital Activism
Pages
(Move to ...)
▼
Sunday, January 28, 2018
LDAP injection: How can it be exploited in an attack?
›
Joomla is a popular content management system that accounts for almost 3% of all websites on the internet, and it has been downloaded over 8...
246 comments:
BlueBorne vulnerabilities: Are your Bluetooth devices safe?
›
Last month, a series of Bluetooth vulnerabilities was discovered by research firm Armis Inc. that enables remote connection to a device with...
310 comments:
How can Windows digital signature check be defeated?
›
Recently, it was determined by a SpecterOps researcher, Matt Graeber, that there is a way to bypass a Windows digital signature check by edi...
139 comments:
Active Cyber Defense Certainty Act: Should we 'hack back'?
›
Recently, a bill was proposed by Georgia Congressman Tom Graves named the Active Cyber Defense Certainty Act, which has now gone on to be ca...
52 comments:
iOS updates: Why are some Apple products behind on updates?
›
A new study from mobile security vendor Zimperium Inc. showed that nearly a quarter of the iOS devices it scanned weren't running the la...
32 comments:
PGP keys: Can accidental exposures be mitigated?
›
Recently, security researcher Juho Nurminen attempted to contact Adobe via their Product Security Incident Response Team (PSIRT) regarding a...
37 comments:
VMware AppDefense: How will it address endpoint security?
›
VMware recently added a new service called AppDefense to their cybersecurity portfolio that aims to lower false positives and utilize least...
54 comments:
›
Home
View web version