Dealing with log4shell aka CVE-2021-44228
A remote code execution flaw exists in log4j2, which is used by basically every Java application on the planet. It’s remotely exploitable, and not just through the front end, but on the back ends....
A remote code execution flaw exists in log4j2, which is used by basically every Java application on the planet. It’s remotely exploitable, and not just through the front end, but on the back ends....
The latest cloud-based file storage platforms not only enable more flexible sharing of information, but they also ensure forensic assessment and surgical recovery from attacks. click here to read full Article Read More on...
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Vulnerability in popular browsers could be used to track, profile users online A vulnerability affecting desktop versions of four popular...
Texas-based SolarWinds Corp said the sprawling breach stemming from the compromise of its flagship software product has cost the company at least $18 million in the first three months of 2021. click here to...
PyBeacon is a collection of scripts for dealing with Cobalt Strike’s encrypted traffic. It can encrypt/decrypt beacon metadata, as well as parse symmetric encrypted taskings Scripts included There is a small library which includes...
Cybersecurity 101: How universities are working with hackers Image and Write-up Resource hyperlink Read More on latest Security Updates