PaulsBonusStories485

From Security Weekly Wiki
Jump to navigationJump to search
  1. Hackers Hit Buzzfeed, Claim To Have Database
  2. Yahoo Secretly Scanned Customer Emails For U.S. Intelligence
  3. Vulnerabilities in Insulin Pumps Can Lead to Overdose
  4. IoT Home Router Botnet Leveraged in Large DDoS Attack
  5. Source Code for IoT Botnet Mirai Released Krebs on Security
  6. Is My Webcam An Offensive Weapon?
  7. Domain Name Resolution Is A Tor Attack Vector
  8. Juniper Unveils New, Upgraded Security Services
  9. Cyber security unicorn Tanium prepares for IPO - Computer Business Review
  10. LightCyber Introduces Free Purple Team Assessment to Test Data Breach Readiness | Business Wire
  11. Raspberry Pi 3 Benchmarks vs. Eight Other ARM Linux Boards - Phoronix
  12. Cisco Warns of Critical Flaw in Email Security Appliances
  13. Congressional Leaders Demand Answers on Yahoo Breach
  14. ripgrep is faster than {grep, ag, git grep, ucg, pt, sift} - Andrew Gallant's Blog
  15. New Raspberry Pi PIXEL Operating System Introduced - Geeky Gadgets
  16. Defending Against Hackers Took a Back Seat at Yahoo, Insiders Say - The New York Times
  17. Microsoft Launches Cloud-Based Fuzzing
  18. The Yahoo hackers weren't state-sponsored
  19. The security tsunami of the Internet of Things is coming, are you ready?
  20. Apple logs your iMessage contacts and could share them with police
  21. Marissa Mayer declined to reset Yahoo users passwords 2 years ago
  22. HP: Disabling 3rd-party ink ensures best printing experience
  23. OpenSSL Swats A Dozen Bugs, One Notable Nasty
  24. Meet The Hackers Who Drive The Porsches You Pay For
  25. UK Police Warn That Modding Games May Turn Kids Into Hackers
  26. Meet Israel's Master Phone Crackers
  27. Thousands Of Cisco Devices Still At Risk Of Unpatched NSA Zero-Day Flaws
  28. 152k Cameras In 990Gbps Record Breaking Dual DDoS
  29. Alibaba fires employees for hacking their way to free mooncakes
  30. How I gained access to TMobiles national network for free Medium
  31. Malware Evades Detection with Novel Technique
  32. Cisco Warns of Command Injection Flaw in Cloud Platform
  33. Employees download new malware every four seconds
  34. North Korea accidentally allows world to access its entire internet
  35. New legislation seeks to prevent US voting systems from being hacked
  36. Malicious Android Apps Due To Increase By 400 Percent In 2016
  37. ICANN Will Switch The Root Zone Signing Key
  38. Malware Infected USB Sticks Posted To Australia Homes
  39. Massive DDoS Attack Launched At Brian Krebs
  40. Yahoo Expected To Confirm Hack Of 200M Users, Report Says
  41. Internet-Connected Vibrator Connects With Privacy Lawsuit
  42. Toymakers Are In Trouble For Illicit Data Collection
  43. Volkswagen Launches New Cybersecurity Firm To Tackle Car Security
  44. AdBlock Plus launches its ad-selling platform
  45. Recovering an iPhone 5c Passcode
  46. Critical Fixes Issued for Windows, Java, Flash Krebs on Security
  47. Tribunal rules computer hacking by GCHQ is not illegal - BBC News
  48. Obama signs two executive orders on cybersecurity
  49. KoreBlog
  50. 35,000 ARRIS Cable Modems At Risk From Firmware Dumper Bot
  51. Meet USBee, the malware that uses USB drives to covertly jump airgaps | Ars Technica
  52. Half of network management systems vulnerable to injection attacks
  53. Snagging creds from locked machines
  54. FTC Panel Encourages Basic Security Hygiene to Counter Ransomware
  55. DHS Urges Vigilance in Protecting Networking Gear
  56. How Spoofing An Ethernet Adapter Lets You Sniff PC Credentials
  57. Hello, Fortinet? Could You Patch These Vulns Please?
  58. Printers Now The Least Secure Things On The Internet
  59. FAA Considers A Ban On Samsung's Exploding Smartphones
  60. Ten-Year-Old Windows Media Player Hack Is The New Black, Again
  61. Dropbox Breach, (Wed, Aug 31st)
  62. L0phtCrack's back! Crack hack app whacks Windows 10 trash hashes
  63. One million IoT devices infected by Bashlite malware-driven DDoS botnet
  64. The most absurd Internet privacy class-action settlement ever
  65. Malware-Ridden Word Docs Lead To Microsoft Alert Blurt
  66. More Banks Plundered Through SWIFT Attacks
  67. Instagram Makes It Easier To Stalk Users
  68. New Cloud Attack Takes Full Control Of Virtual Machines With Little Effort
  69. Facial recognition can be tricked with Facebook photos
  70. VxWorks: Execute My Packets | Exodus Intelligence
  71. Epic Games Forums Hacked, SQL Injection Vulnerability Blamed
  72. Leaked ShadowBrokers Attack Upgraded to Target Current Versions of Cisco ASA
  73. Americans want passwords, not biometrics, survey finds
  74. Hacking smart cities: Dangerous connections
  75. How Bitcoin Helped Fuel An Explosion In Ransomware Attacks
  76. EFF Slams Disregard For User Privacy With Windows 10
  77. Four In Five Android Devices Inherit Linux Snooping Flaw
  78. Ashley Madison Agrees To Security Overhaul After Damning Report
  79. What Mr. Robot Can Teach Businesses About Security
  80. Unsecured DNSSEC Easily Weaponized, Researchers Warn
  81. GPG Patches 18-Year-Old Libgcrypt RNG Bug
  82. How to disable WPAD on Windows so hackers can't hijack your computer
  83. Hacker Jeopardy: When manhood is the question at Defcon - CNET
  84. Snowden Thinks Russia Hacked The NSA
  85. Baltimore Police Accused Of Illegal Mobile Spectrum Use With Stringrays
  86. Iran Investigating Possible Cyber Angle On Oil Fires
  87. Kaspersky Uncovers Malware Riding On The Back Of Google Adsense
  88. IoT Sockets Make For Another Big Security Problem
  89. People Ignore Security Alerts Up To 90% Of The Time
  90. Is Russia Hacking The US Election?
  91. Fortinet Follows Cisco In Confirming Shadow Broker Vuln
  92. Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
  93. Frequent Password Changes Is a Bad Security Idea
  94. Facebooks favorite hacker is back with an ironic security hole
  95. Raucous Ruckus router ruckus roundly rumbles: Infosec bod says Wi-Fi kit is weak, biz says no
  96. Patch vBulletin, or get popped
  97. Linux malware? That'll never happen. Ok, just this once then
  98. The Pwnies Have Been Awarded
  99. Apple Starts A Bug Bounty Program
  100. Rise Of The Hacking Machines
  101. How Many Zero-Day Vulns Is Uncle Sam Sitting On?
  102. Flaw In Samsung Pay Lets Hackers Wirelessly Skim Credit Cards
  103. Big Red Alert: Oracle's MICROS Payment Terminal Biz Hacked
  104. Project Sauron Malware Was Hidden For Five Years
  105. Half Of All Connected Cars Have Security Vulnerabilities
  106. Microsoft Proves Backdoor Keys Are A Terrible Idea
  107. Nobody Knows What Cyberattacks Really Cost
  108. Hackers could weaponize up to a billion monitors to spy on everyone
  109. NIST Recommends SMS Two-Factor Authentication Deprecation
  110. Saved from ransomware thugs... by rival ransomware thug
  111. Cloud Adoption Grows as Security Lags
  112. Snowden Designs Phone Case To Spot Hack Attacks
  113. The End Of Yahoo: Why Verizon Spent Big
  114. TechCrunch Defaced By Self-Professed White Hats
  115. Osram Lightify Light Bulbs Vulnerable To Hack
  116. Hackers Could Sniff Out Your Passwords If You're Typing Nearby
  117. Zero-day hole can pwn millions of LastPass users, all that's needed is a malicious site
  118. Airbus Is Making Drone Killers
  119. Guest Diary, Etay Nir: Flipping the Economy of a Hacker, (Wed, Jul 20th)
  120. Everything You Need To Know About Web Shells
  121. Drone operator arrested for flying over wildfire
  122. SeaWorld hacker and bomb hoaxer escapes prison sentence
  123. Alex Gibney on Stuxnet and why we need to talk about cyberwar
  124. Adobe, Microsoft Patch Critical Security Bugs Krebs on Security
  125. Gotta Catch Em All! WORLDWIDE! (or how to spoof GPS to cheat at Pokmon GO) - Insinuator
  126. Is Cloud Computing Really Secure? A Pragmatic Approach
  127. Update now: Macs and iPhones have a Stagefright-style bug!
  128. Ransomware on the Cheap
  129. 15 Vulnerabilities in SAP HANA Outlined
  130. EFF Files Lawsuit Challenging DMCAs Restrictions on Security Researchers
  131. The Mr. Robot Easter Egg Hunt Has Begun
  132. Bruce Schneier Joins The Tor Project
  133. Cisco Gives You Two Nasty Bugs To Fix Before The Weekend
  134. Thanks, Script Kiddies: 100 Gbps DDoS Attacks Now Commonplace
  135. Hackers Claim Credit For Crashing Pokemon Go
  136. IoT Insecurity: Pinpointing The Problems
  137. The coolest US agency is starting a revolution to get rid of computer viruses
  138. WikiLeaks under 'sustained attack' after announcing release of Turkey docs - CNET
  139. IoT spurs surprise surge in assembly language popularity | InfoWorld
  140. Criminals plant banking malware where victims least expect it | Ars Technica
  141. Pokemon Go has a really, REALLY serious Google security issue right now
  142. Enterprises leave vulnerable industrial control systems exposed online
  143. The FBI Says Its Malware Isnt Malware Because the FBI Is Good
  144. Fear My $50 Charger, For It Controls Your Android Phone's Keyboard
  145. MIT Anonymity Network Riffle Promises Efficiency, Security
  146. Drupal Patches Remote Code Execution Vulnerabilities in Three Modules
  147. Food Chain Wendy's Hit By Massive Hack
  148. HTTPS Is Not A Magic Bullet For Web Security
  149. Kim Dotcom Plans 2017 Relaunch Of Megaupload
  150. VPN Provider Claims Russia Seized Its Servers
  151. FDIC Was Hacked By China, And The CIO Covered It Up
  152. Juniper's Bug Hunters Fire Out Eight Patches
  153. Visiting a Website against the Owner's Wishes Is Now a Federal Crime
  154. Rigged YouTube videos can use Siri and Google Now to hijack your phone
  155. Fake Pokmon GO app watches you, tracks you, listens to your calls
  156. Drupal: Patch released today to fix a highly critical RCE in contributed modules, (Wed, Jul 13th)
  157. Password Sharing Is Now a Crime
  158. European Unions First Cybersecurity Law Gets Green Light - Bloomberg
  159. Researcher pops locks on keylogger, finds admin's email inbox The Register
  160. SSD Advisory Wget Arbitrary Commands Execution SecuriTeam Blogs
  161. UPC UBEE EVW3226 WPA2 Password Reverse Engineering, rev 3
  162. How Sony, Microsoft, and Other Gadget Makers Violate Federal Warranty Law | Motherboard
  163. Alarm systems alarmingly insecure. Oh the irony | Pen Test Partners
  164. Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
  165. A Case Study in Attacking KeePass harmj0y
  166. FBI Director: Clinton Emails Were Careless, Not Criminal
  167. Nasty BIOS bug slugs Gigabyte, hackers say
  168. Top Router Maker TP-Link Loses Control Over Configuration Domain
  169. D-Link Wi-Fi Camera Flaw Extends to 120 Products
  170. Celebgate Nudes Hacker Pleads Guilty
  171. Silent Circle Killed Their Warrant Canary
  172. New Backdooring Mac Malware Discovered
  173. WikiLeaks Downed In Apparent Heavyweight Hacker Feud
  174. Palo Alto Offers $16,000 In Looming CTF Hack Off
  175. Symantec Won't Fix Catastrophic Flaws Until Mid-July
  176. OpenIOC Sharing Threat Intelligence
  177. Facebook Using Physical Location to Suggest Friends
  178. What is your most unusual User-Agent?, (Wed, Jun 29th)
  179. Interview with an NSA Hacker
  180. Google Play Hit with Rash of Auto-Rooting Malware
  181. Planes, Trains and Automobiles Increasingly in Cybercriminals Bullseye
  182. Conficker Used in New Wave of Hospital IoT Device Attacks
  183. Ransomware targets corporate Office 365 users in 0-day campaign
  184. A hacker wants to sell 10 million patient records on the black market
  185. One Picture Can Unlock All Your Apps
  186. US Hospitals Hacked With Ancient Exploits
  187. Malware Spawns Botnet In 25,000 Connected CCTV Cameras
  188. The Top 5 Security Threats, And How To Defend Against Them
  189. Facebook 'Hack' Victim Exposes Passport Scam
  190. Symantec Flaws As Bad As It Gets, Claims Google's Project Zero
  191. Hackers Note That Most Breaches Just Need Normal Admin Tools
  192. Judge says the FBI can hack your computer without a warrant
  193. GitHub - RedBalloonShenanigans/MonitorDarkly: Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.
  194. ASUS UEFI Update Driver Physical Memory Read/Write codeinsecurity
  195. Verizon Patches Serious Email Flaw That Left Millions Exposed | Threatpost | The first stop for security news
  196. Email Servers For More Than Half of Worlds Top Sites Can Be Spoofed
  197. WordPress Security Update Patches Two Dozen Flaws
  198. AirPort owners: Apple's patched a mystery vuln
  199. 'Plane Hacker' Roberts hacks cows
  200. Stuxnet was the opening shot of decades of non-stop cyber warfare
  201. T-Mobile Rep Sells 1.5 Million Customer Records
  202. Google Turns To Codeless Tap Factor Authentication
  203. Mark Zuckerberg is paranoid about webcam spies for good reason
  204. Fraudsters are Buying IPv4 Addresses
  205. Tor coders harden the onion against surveillance
  206. WordPress Patches Zero Day in WP Mobile Detector Plugin
  207. Like Macros Before It, Attackers Shifting to OLE to Spread Malware
  208. Dont run JS email attachments: they can carry potent ransomware
  209. Hack The Pentagon Shutters 100 Bugs
  210. Database Corruption Erases 100,000 Air Force Investigation Records
  211. Russian Government Hackers Spent One Year Inside Our Servers, Admits DNC
  212. DeadUpdate: Kickin' it bigtime. GitHub
  213. NSA Using Insecure Word Macros
  214. Infecting Systems by Typosquatting Programming Language Libraries
  215. Github hit by massive password guessing attack
  216. BadTunnel: a vulnerability all Windows users need to patch
  217. Google To Shame Partners That Don't Offer Android Updates Quickly
  218. Reddit Resets 100,000 User Passwords After Surge In Hacked Accounts
  219. Adobe Flash: 6 Tips For Blocking Exploit Kits
  220. SandJacking Attack Puts iOS Devices At Risk to Rogue Apps
  221. Facebook Messenger may soon add end-to-end encryption
  222. How the Top 5 PC Makers Open Your Laptop to Hackers
  223. Microsoft Windows zero-day exploit hits the market with $90,000 price tag
  224. Printer security: Is your company's data really safe?
  225. Myspace data breach: 360 million accounts affected
  226. Report: IT Professionals Far Removed From Reality On Security
  227. Your WordPress and Drupal installs are probably obsolete
  228. Moxa Discontinuing Vulnerable Line of ICS Devices
  229. Shhhh! Facebook Is Listening
  230. TeamViewer denies hack, as users claim computers remotely hijacked
  231. Has TeamViewer Been Hacked?
  232. Google Feature Finally Addressing The 'I Lost My Phone' Problem
  233. Lenovo Tells Users to Uninstall Vulnerable Updater
  234. Google Patches Two High-Severity Flaws in Chrome
  235. Jeremiah Grossman: Life is Better without Username Reuse (email aliases FTW!)
  236. Jeremiah Grossman: 7 Tips to Get the Absolute Best Price from Security Vendors
  237. Apple hires crypto-wizard Jon Callas to beef up security
  238. APT Groups Finding Success with Patched Microsoft Flaw
  239. Google To Kill Passwords On Android
  240. Pastejack Attack Turns Your Clipboard Into A Threat
  241. Microsoft Bans Common Passwords That Appear In Breach Lists
  242. Anonymous Ops Trending, Where are the Other Hacktivists?
  243. Looking for Trouble
  244. When domain names attack: the WPAD name collision vulnerability
  245. Elders way better at password security than millennials
  246. Inside the world's second worst exploit toolkit
  247. 5 Reasons Enterprises Still Worry About Cloud Security
  248. Microsoft Disables Wi-Fi Sense on Windows 10
  249. 2012 LinkedIn Breach Just Got a Lot Worse: 117 Million New Logins For Sale
  250. Ubiquiti Networks Gear Targeted By Worm
  251. SkinTrack Turns Your Arm Into a Touchpad. Heres How It Works
  252. Apple bans Stefan Esser's iOS security info app
  253. OkCupid Study Reveals the Perils of Big-Data Science
  254. Google Chrome Will Switch Off Flash Content By Default
  255. Hacker Fans Give Mr. Robot Website Free Security Checkup
  256. TeslaCrypt's Master Key Released To The Public
  257. Vidyo Flaw Leaks Videos And Local Files
  258. You'll still be able to hack Linksys WRT routers with open source firmware despite new FCC rules
  259. Torvalds on the Internet of Things: Security plays second fiddle
  260. Windows 10 won't let you share WiFi passwords any more
  261. Hacker Finds Vulnerability In Mr Robot Website
  262. GCHQ Wants You To Stop Resetting Your Password
  263. Kiddicare Compromised
  264. Panama Papers Now Searchable
  265. Researcher Arrested For Disclosing Election Vulnerabilities
  266. WordPress Redirect Hack via Test0.com/Default7.com - Sucuri Blog
  267. Caleb Madrigal
  268. Freaking out over the DBIR
  269. 5 Things Devs Wish CISOs Knew About DevOps
  270. Top 3 Reasons Why Neglecting Application Security Is Risky Business
  271. Economist Detained for Doing Math on an Airplane
  272. The day we discovered our parents were Russian spies | World news | The Guardian
  273. Push Your ICS Vendor / Integrator To Do It Right
  274. Wendys: Breach Affected 5% of Restaurants
  275. Wendys admits to payment card malware infection
  276. Pornhub bug bounty program will pay hackers up to $25,000
  277. Documenting the Chilling Effects of NSA Surveillance
  278. I'm Writing a Book on Security
  279. Lean Threat Intelligence, (Mon, May 2nd)
  280. Bringing HTTPS to all blogspot domain blogs
  281. Practical Reverse Engineering Part 2 - Scouting the Firmware Hack The World
  282. Economy of mechanism The road to hell is paved with SAML Assertions
  283. Jailbreaking the Microsoft fitness band b0n0n's cottage
  284. haxx.ml Hacking Mattermost: From Unauthenticated to System...
  285. Building a Home Lab to Become a Malware Hunter - A Beginners Guide | AlienVault
  286. GitHub - reverse-shell/routersploit: The Router Exploitation Framework
  287. SAST vs PEN TESTING
  288. Snort Lab: Custom SCADA Protocol IDS Signatures
  289. IoT Security: Medical Devices Are the Next Target for Hackers
  290. Why it would have been a relief to know whos behind bitcoin
  291. 10-year-old Finnish boy uncovers Instagram comments vulnerability
  292. Are Your Web Applications Vulnerable to ImageTragick? Scan Them with Netsparker
  293. Craig Wright Revealed As Bitcoin Creator Satoshi Nakamoto
  294. I Am Craig Wright, Inventor Of Craig Wright
  295. Miniature Car Maker Drops Massive Malware
  296. How The Pwnedlist Got Pwned
  297. Instagram Hacked By 10-Year-Old Boy
  298. Two highly dangerous OpenSSL security bugs have been patched
  299. Kippos Cousin Cowrie, (Wed, Apr 27th)
  300. Gamekeeper turns poacher? The ex-Tor developer who unmasked Tor users for the FBI
  301. US-CERT to Windows Users: Dump Apple Quicktime Krebs on Security
  302. Linux infosec outfit does a Torvalds, rageblocks innocent vuln spotter
  303. Time for a patch: six vulns fixed in NTP daemon
  304. Batten down the hatches! OpenSSL preps fix for high impact vuln
  305. Spotify Denies Hack After Users' Personal Data Shows Up On Pastebin
  306. Businesses Pay $100,000 To DDoS Extortionists Who Never DDoS Anyone
  307. All Phones In India To Be Equipped With Panic Buttons From 2017
  308. Why its easier to fix a broken product than a broken team
  309. German Nuclear Power Plant Infected With Malware
  310. 10 Newsmakers Who Shaped Security In the Past Decade
  311. How To Stay Secure At The Hotel On A Business Trip
  312. Opera is the first big web browser with a built-in VPN
  313. Hackers turn their back on exploiting Java to focus on Flash flaws
  314. Misunderstanding Indicators of Compromise
  315. Security Lessons from C-3PO, Former CSO of the Millennium Falcon
  316. Cisco Patches Denial-of-Service Flaws Across Three Products
  317. 29% of Android devices cant be patched by Google
  318. How Hacking Team Got Hacked
  319. Judge tosses evidence obtained by FBI malware planted on dark website
  320. Hyping vulnerabilities is no longer helping application security awareness | TechCrunch
  321. RDP Replay Code Release
  322. Cisco Talos Blog: Ransomware: Past, Present, and Future
  323. Millions of Arris cable modems vulnerable to denial-of-service flaw | ZDNet
  324. 'CyberUL' Launched For IoT, Critical Infrastructure Device Security
  325. NoScript and other popular Firefox add-ons open millions to new attack | Ars Technica
  326. Practical Reverse Engineering Part 1 - Hunting for Debug Ports Hack The World
  327. SANS Penetration Testing | Scapy Cheat Sheet from SANS SEC560 | SANS Institute
  328. Windows 10 debuts Blue QR Code of Death and why malware will love it
  329. New JavaScript attack infects your phone and changes your router's DNS settings
  330. 0-day exploits more than double as attackers prevail in security arms race
  331. Journalist sentenced to 24 months in prison after hacking-related conviction
  332. New report claims gray hat hackers, not Cellebrite, helped crack San Bernardino iPhone
  333. Is Cloud Security An Exaggerated Concern? - Dark Reading
  334. Explicit Furry Podcast Airs On US Radio After Hack
  335. Half Of People Plug In USB Drives They Find In The Parking Lot
  336. Do US universities deserve an F in teaching cybersecurity?
  337. Weve got stalkers in our pockets
  338. Blackhole Exploit Kit Author Gets 8 Years
  339. BADLOCK Are Branded Exploits Going Too Far?
  340. The ransomware attack that knows where you live
  341. Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers -
  342. IoT IP camera teardown and getting root password
  343. Neighbour sick of you parking in his driveway? You'd better hack-proof your car
  344. Hacking Team lost its license to sell surveillance malware outside Europe
  345. Reddit Has Lost Its Warrant Canary
  346. Hacker Reveals $40 Attack That Steals Police Drones From 2km Away
  347. Turkey's Entire Citizenship Database May Have Been Leaked
  348. Hackers Demo Persistent, Quiet Attacks Through Windows DSC
  349. How To Make Big Bucks Hunting Cyber Bugs
  350. Defenders Need to Embrace Offensive Security Skillsets
  351. The latest Flash zero-day was used to spread Cerber ransomware
  352. Healthcare Organizations Must Consider The Financial Impact Of Ransomware Attacks
  353. China's Great Firewall inventor forced to use VPN live on stage to dodge his own creation
  354. Your car's computers might soon get malware protection
  355. Ubuntu Patches Kernel Vulnerabilities
  356. OSVDB Shuts Down For Good
  357. Flash zero-day in the wild to be fixed by Adobe
  358. FBI: $2.3 Billion Lost to CEO Email Scams
  359. Waaay Too Many Things Are Exposing VNC On The Internet
  360. Six Charged For Hacking Lottery To Spew Only Winning Tickets
  361. A Hundred Million Truecaller Users Vulnerable To Privacy Bug
  362. Some Old SAP Systems Have Default Kernel User Accounts
  363. LiveJournal Hit With Angler Exploit Kit
  364. FBI Investigates Hacks Against U.S. Law Firms
  365. Bash, better biometric security, Cortana and a flood of chatbots coming to Windows 10
  366. Cisco, Snort Scramble To Plug Malware Hole
  367. Nearly 1,500 Vulnerabilities Found In Automated Medical Equipment
  368. New self-protecting USB trojan able to avoid detection
  369. SDR Radio Academy: Reverse engineering a wireless car key fob.: phasenoise
  370. More on Purple Teaming Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
  371. [1]
  372. How to Avoid a Kings Ransom
  373. Dark Webs got a bad rap: 7 in 10 want it shut down
  374. 1418 Vulnerabilities In A Medical Device What Now?
  375. Ports Are Meaningless
  376. Stealthy USB Trojan hides in portable applications, targets air-gapped systems
  377. Mobile Security: Why App Stores Don't Keep Users Safe
  378. FBI Cybers Most Wanted
  379. TP-Link blocks open source router firmware to comply with new FCC rule | Ars Technica
  380. Once thought safe, DDR4 memory shown to be vulnerable to Rowhammer | Ars Technica
  381. What does Oman, the House of Cards, and Typosquatting Have in Common? The .om Domain and the Dangers of Typosquatting | ENDGAME
  382. Emergency Java Patch Re-Issued for 2013 Vulnerability
  383. FBI Warns On Risks Of Car Hacking
  384. MITRE Rolls Out New CVE System After Reg Reveal
  385. Only 0.1% Of You Are Doing Web Server Security Right
  386. Hacktivists caught tampering with water treatment plant
  387. Firmware bug in CCTV software may have given POS hackers a foothold
  388. Researchers Find Hole In SIP, Apple's Newest Protection Feature
  389. Vulnerability Scanners Turn Up Mostly False Positives
  390. Ironic: CCTV systems slide open a backdoor into your biz network
  391. Surprise! You have mystery PCs
  392. Attackers Packing Malware Into Powershell
  393. Threat Intelligence's Big Data Problem
  394. Even Sex Toys Arent Safe From Hackers, Tech Companies Warn
  395. It is time to prioritize security for Internet of Things and wearables
  396. Hotel light control hack illuminates lamentable state of IoT security
  397. Amazon goes after patent so you can pay by selfie
  398. LinkedIn Being Used To Prime Phishing Targets
  399. One of the Celebgate hackers pleads guilty to phishing iCloud and Google logins
  400. Home Depot To Pay $19.5 Million In Data Breach Settlement
  401. Safari, Flash Fall at Pwn2Own 2016 Day One
  402. SSH Honeypots (Ab)used as Proxy, (Sun, Mar 13th)
  403. Defence In Depth For Web Applications
  404. Erin Andrews awarded $55m over nude video shot through hotel door peep hole
  405. My last days at WhiteHat and setting sights on the future
  406. Why Your Security Tools Are Exposing You to Added Risks
  407. Quick Analysis of a Recent MySQL Exploit - SANS Internet Storm Center
  408. HTCAP
  409. A Warning for Wearables: Think Before You Emote
  410. Patch Management Still Plagues Enterprise
  411. DROWN Vulnerability Remains High Risk, Firms Say
  412. Trivial Path For DDoS Amplification Attacks Found
  413. Boffins Bust Biometrics With Inkjet Printer
  414. Security market to exceed $170 billion by 2020, analysts say
  415. Opera Becomes First Major Web Browser to Introduce Native Ad-Blocking Feature
  416. The @ legacy of Ray Tomlinson
  417. Before Moving on From RSA
  418. Cisco Patches A Bunch Of Cable Modem Vulns
  419. Tablets dead after six years
  420. Palo Alto Networks CEO At RSA: Security Isn't About Technology, It's About Trust
  421. Apple Reissues Security Update After Blocking Ethernet on Mac OS X
  422. Samsung now shipping 15.36TB PM1633a SSD -- world's largest capacity solid state drive
  423. Reinvented Ransomware Now Targeting WordPress Sites
  424. Over 700 Million Records Breached In 2015
  425. Is Your Smartphone Listening To You?
  426. DROWN Flaw Illustrates Dangers Of Intentionally Weak Crypto
  427. Hardcoded God-Mode Code Found In RSA 2016 Badge-Scanning App
  428. I got hacked mid-air while writing an Apple-FBI story
  429. Troy Hunt: Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs
  430. GitHub - firmadyne/firmadyne: Main repository
  431. GitHub - AFITWiSec/EZ-Wave: Tools for Evaluating and Exploiting Z-Wave Networks using Software-Defined Radios.
  432. CCDC Quals Notes (metasploit) Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
  433. Hacker Summer Camp Planning Guide System Overlord
  434. What It Takes to Master Security (Hint: It's Not Certs) - OpenDNS Blog
  435. GitHub - enddo/smod: MODBUS Penetration Testing Framework
  436. Practical TEMPEST Attack
  437. Hackers could hijack your computer via its vulnerable wireless mouse or keyboard
  438. Life with the Nest Protect: Are smart smoke detectors a dumb idea?
  439. Linux Mint Forum Database Compromised for at Least a Month Before Announcement
  440. Patient monitors altered, drug dispensary popped in collosal hospital hack
  441. With few options, companies pay hush money to data thieves
  442. How an audit can shore up your security strategy
  443. Nissan LEAF cloud security fail leaves drivers exposed
  444. Judge Confirms DoD Funded Research to Decloak Tor Users
  445. Confirmed: Carnegie Mellon University Attacked Tor, Was Subpoenaed By Feds
  446. Is The Cybersecurity Bubble About To Burst?
  447. NetworkMiner - The NSM and Network Forensics Analysis Tool
  448. GCHQ intel used to develop Stuxnet, claims new documentary
  449. Hack VMware, Score US$75K. Hack Flash, Get Much Less.
  450. Cisco Customers On Alert Over New Vulns
  451. Instagram Is Adding Two-Factor Authentication
  452. Glibc Vuln Puts All Linux Machines At Risk
  453. Sergey Lozhkin on How He Hacked His Hospital
  454. Popular home security system SimpliSafe can be easily disabled by burglars
  455. The Great EMV Fake-Out: No Chip For You!
  456. Using Eagles to Intercept Drones
  457. Instagram bug could have allowed others to read your direct messages
  458. Judge Demands that Apple Backdoor an iPhone
  459. Underage Hacker Is behind Attacks against US Government
  460. More IoT insecurity: The surveillance camera that anyone can log into
  461. 5 Big Incident Response Mistakes
  462. D-Link DSL-2750B Remote Command Execution
  463. ASUS Router Administrative Interface Exposure
  464. Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor, (Wed, Feb 10th)
  465. Weird Fitbit data helps one man discover his wife is pregnant
  466. We might use your IoT stuff to spy on you, says top spook James Clapper
  467. IoTs Day of Reckoning on the Horizon
  468. Power Grid Honeypot Puts Face on Attacks
  469. We're Going To Use Your Toothbrush To Spy On You, Says Clapper
  470. How To Hack The Power Grid Through Home Air Conditioners
  471. Cisco Security Kit Wide-Open To IKE Bug
  472. Hackers aren't smart -- people are stupid
  473. Moving to a Plugin-Free Web (Java Platform Group, Product Management blog)
  474. Week 5 In Review 2016
  475. Sources: Security Firm Norse Corp. Imploding Krebs on Security
  476. FortiGuard SSH backdoor found in more Fortinet security appliances | CSO Online
  477. Damn Vulnerable Safe - Insinuator
  478. GitHub - cve-search/cve-search: cve-search - a tool to perform local searches for known vulnerabilities
  479. Critical Wi-Fi Flaw Patched on Android
  480. Harvard Paper Rebuts Going Dark
  481. Toys Patched Against Flaws That Put Childrens Data, Safety At Risk
  482. Socat Warns Weak Prime Number Could Mean Its Backdoored
  483. Chromodo Browser Disables Same-Origin Policy
  484. Getting A Reverse Shell On Your Seagate Personal NAS
  485. eBay Refuses To Fix Flaw Exposing Users To Malware And Phishing Attacks
  486. Google Lumps MalwareBytes With A Bad Security Report
  487. In A UEFI World, "rm -rf /" Can Brick Your System
  488. More CISOs looking to recruit cyber-security trainers than leaders, analysts, engineers or pen testers
  489. Automating Vulnerability Scans, (Wed, Feb 3rd)
  490. EMET 5.5 Released, (Wed, Feb 3rd)
  491. Websites running WordPress hacked to display money-making ads for hackers
  492. The Internet of Things Will Be the World's Biggest Robot
  493. Interview: John Matherly On Check Point Blacklisting Shodan
  494. Hard-Coded Password Found In Lenovo File-Sharing App
  495. Magento Update Addresses XSS, CSRF Vulnerabilities
  496. Show us the code! You should be able to peek inside the gadgets you buy FTC commish
  497. Hacker Who Sent Heroin To Brian Krebs Pleads Guilty
  498. MiniUPnP Vulnerability Clears Way for Stack Smashing Attack
  499. NSAs top hacking boss explains how to protect your network from his attack squads
  500. BlackEnergy APT Group Spreading Malware via Tainted Word Docs
  501. Oracle plans to kill an attacker's favorite: the Java browser plug-in
  502. OpenSSL Patches Serious Flaw that Puts Popular Applications At Risk
  503. DDoS World Record Broken With 500 Gbps Attack In 2015
  504. Angler Exploit Kit Now Hooking Execs With Xmas Flash Hole
  505. Police destroy evidence with 10 failed passcode attempts on iPhone
  506. Worried about cyberattacks on US power grid? Stop taking selfies at work - CSMonitor.com
  507. SEC Consult: Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices
  508. Hot Potato Windows Privilege Escalation
  509. Autopwn every Android < 4.2 device on your network using BetterCap and the "addJavascriptInterface" vulnerability. - Simone Margaritelli
  510. 6 Tips for Turning Developers Into AppSec Allies
  511. Purple Teaming - Lessons Learned & Ruxcon Slides
  512. Casino Sues Security Firm for Failing to Contain Malware Infection
  513. The Evolution of the Wireless Penetration Test | Immunity Services
  514. OpenSSH Private Crypto Key Leak Patch | Threatpost | The first stop for security news
  515. /tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!, (Wed, Jan 20th)
  516. 123456 Still The Most Common Password For 2015
  517. Serious Linux Kernel Vulnerability Patched
  518. Oracle Unleashes 248 Security Updates In First Patch Release Of 2016
  519. Hot Potato Exploit Mashes Old Vulns Together
  520. Numbers dont lieits time to build your own router
  521. Linux vulnerability puts millions of people at risk -- Android users should panic
  522. FireEye buys iSight Partners for $200M
  523. HD Moore exiting Rapid7 for VC-land
  524. 26 of the craziest and scariest things the TSA has found on travelers
  525. HD Moore To Build New Venture Capital Firm
  526. DSA-3444 wordpress - security update
  527. Fortinet SSH Backdoor Found In Firewalls
  528. Was Sean Penn really responsible for El Chapos arrest? | Fusion
  529. Denial-of-Service Flaw Patched in DHCP
  530. Curious Tale of a Microsoft Silverlight Zero Day
  531. Adobe Patches Code Execution Flaws in Reader, Acrobat
  532. The Infamous 'Hacker Manifesto' Just Turned 30
  533. $30 Webcam Spun Into Persistent Network Backdoor
  534. Microsoft finally has a proper way to opt out of Windows 7/8 to Windows 10 upgrades
  535. Why thinking like a criminal is good for security
  536. IoT Security: $1-per-Thing To Protect Connected Devices
  537. Cisco fixes unauthorized access flaws in access points, wireless LAN controllers
  538. Powerball lessons for infosec
  539. Mythical vuln-disclosure program
  540. The Biggest Security Threats We'll Face In 2016
  541. IPv6 Celebrates Its 20th Birthday By Reaching 10 Percent Deployment
  542. Zerodium Offers $100k For Adobe Flash Bypasses
  543. Microsoft To Axe Support For Older Internet Explorer Next Week
  544. 'You're updated!' Drupal says, with fingers crossed behind back
  545. Exploiting Silent Circle's Secure Blackphone
  546. Uber to pay $20,000 in settlement over data breach
  547. SLOTH Attacks Up Ante on SHA-1, MD5 Deprecation
  548. Vulnerable Joomla! Installation under active attack | Symantec Connect Community
  549. Juniper ScreenOS Backdoor Password | Threatpost | The first stop for security news
  550. Advent tip #17: Reply All is probably not what you want
  551. Attacks Ramp Up Against Joomla Zero Day
  552. It was Shodan easy! MacKeeper user database left wide open
  553. IoT startup Afero goes end to end for security
  554. Got A Drone? It's Registration Time, Says The FAA
  555. Google's Project Zero Uncovers FireEye Vulnerability
  556. Windows 10: Microsoft now offers users two choices - "upgrade now" or "upgrade tonight"
  557. Over 680TB of data exposed in MongoDB databases
  558. Press Backspace 28 times to own unlucky Grub-by Linux boxes
  559. Boiled passports leave a bad taste in the mouth of authorities
  560. Congress Slips CISA Into A Budget Bill That's Sure To Pass
  561. The Programming Languages That Spawn The Most Software Vulnerabilities
  562. Lock up your top-of-racks, says Cisco, there's a bug in the USB code
  563. France Looking At Banning Tor, Blocking Public Wi-Fi
  564. Vulnerabilities found in Lenovo, Toshiba, Dell support software
  565. Linksys routers vulnerable through CGI scripts
  566. Trump Says "Closing The Internet" Is A Good Way To Fight Terrorism
  567. Known Security Flaw Found In More Antivirus Products
  568. Toys Could Be Used As Spying Devices, MPs Told
  569. Cisco Warning of Vulnerabilities in Routers, Data Center Platforms
  570. The Employee Password Habits That Could Hurt Enterprises
  571. Internet Root Name Servers Survive Unusual DDoS Attack
  572. Enforcing USB Storage Policy with PowerShell, (Wed, Dec 9th)
  573. New Burp Feature - ClickBandit, (Thu, Dec 10th)
  574. In patches we trust: Why software updates have to get better
  575. Bitcoins Creator Satoshi Nakamoto Is Probably This Unknown Australian Genius
  576. Australian Police Raid Chap's Home In Hunt For Bitcoin Creator
  577. Bitcoin whodunit leads to Oz - CNET
  578. Some notes on fast grep
  579. Adobe Flash Is Dead in Name Only
  580. Hacker Turns Raspberry Pi Zeros Into Selfie Slayers
  581. Could Hackers Break My Heart Via My Pacemaker?
  582. Microsoft tries to ease Windows 10 upgrade process - CNET
  583. More than 900 embedded devices share hard-coded certs, SSH host keys
  584. GreenDog's blog: 3 Attacks on Cisco TACACS+: Bypassing the Cisco's auth
  585. Dude, You Got Delld: Publishing Your Privates - Blog - Duo Security
  586. Samy Kamkar: MagSpoof - credit card/magstripe spoofer
  587. Version 2.2 Release jmk-foofus/medusa@5a7b76e GitHub
  588. Hello Barbie Security: Part 1 - Teardown Somerset Recon
  589. 5 Tips for Pentesters Using Python 3
  590. My SecTor Story: Root Shell on the Belkin WeMo Switch
  591. The Gartner Magic Quadrant: Four Traits From Top Performers
  592. Did Carnegie Mellon Attack Tor for the FBI?
  593. KeeFarce Extract KeePass Passwords (2.x) From Database
  594. Paris Terrorists Used Double ROT-13 Encryption
  595. Federal Legislation Targets Swatting Hoaxes
  596. Clearing the Air on Wi-Fi Software Updates | FCC.gov
  597. Its Way Too Easy to Hack the Hospital
  598. BadBarcode Internet Of Things Hack PacSec 2015 | Threatpost | The first stop for security news
  599. Siri's Lockscreen Bypass A Growing Privacy Issue For iOS Users
  600. US-China Security Review Commission Discusses 'Hack-Back' Laws
  601. Martel Police Body Camera Virus Found Embedded into Camera | iPower Technologies
  602. Failed Windows 3.1 system blamed for shutting down Paris airport | Ars Technica
  603. Trouble Brewing As iThing Coffee Machine Seems To Be Hackable
  604. Anonymous Declares War On Islamic State
  605. US Lawmakers Advised To Consider Hacking China Back
  606. The Lingering Mess from Default Insecurity
  607. ISA100 / WirelessHART Sentinel To Detect Jamming?
  608. How a mobile app firm found the XcodeGhost in the machine
  609. Wireless jammers cast a dark shadow on IoT security
  610. Fake IT admin tricked Cox rep into handing over customer database
  611. Court Says Tracking Web Histories Can Violate Wiretap Act
  612. Thanks for playing: New Linux ransomware decrypted, pwns itself
  613. Solving Security: If You Want Something New, Stop Doing Something Old
  614. Face-slapping alarm clock refuses to let you sleep in
  615. Exploit Writing and Mitigation Going Hand in Hand
  616. [webapps - vBulletin 5.1.x - PreAuth 0day Remote Code Execution Exploit]
  617. The top 10 apps that companies hate
  618. Hackers Claim Million Dollar Bounty For iOS Zero Day Attack
  619. Kevin Spacey Hired To Put The Hollywood Into Cyber Security
  620. No C&C server needed: Russia menaced by offline ransomware
  621. Mature & Unconfident: The Best Information Security Teams Ever!
  622. Library of Congress Says It's OK to Hack Your Car | WIRED
  623. Saving Systems from SQLi | WhiteHat Security Blog
  624. Boasting about your binges on Facebook could hurt your credit score
  625. Undercover cop answers Craigslist ad for a hacker
  626. How to become a pentester | Corelan Team
  627. Mathy Vanhoef: Advanced WiFi Attacks Using Commodity Hardware
  628. How to Commandeer a Store PA System
  629. Dont Be Fooled by Fake Online Reviews Part II
  630. Apple tells judge it's "impossible" to unlock a device running iOS 8 or higher
  631. Fitbit Vulnerability Means Your Tracker Could Spread Malware
  632. IoT security threats and how to handle them
  633. Smartwatch A Fashionable and Dangerous Gadget
  634. Attackers hijack CCTV cameras and network-attached storage devices to launch DDoS attacks
  635. To Find The Needle, Chop Down the Haystack: 5 Steps For Effective Threat Monitoring
  636. The First Rule Of Zero-Days Is No One Talks About Zero-Days
  637. Teen Who Hacked CIA Director's Email Tells How He Did It
  638. German Govt Mulls Security Standards For SOHOpeless Routers
  639. Hackers Make Cars Safer. Don't Ban Them From Tinkering
  640. Apple CEO Tim Cook Blasts Encryption Backdoors
  641. HP adds protection against firmware attacks to enterprise printers
  642. Can myriad wireless networks connect as one fast, secure system?
  643. FireEye Myth and Reality
  644. No End In Sight For Exposed Internet Of Things, Other Devices
  645. Google Patches Chrome, Changes Mixed Content Warnings
  646. WordPress Fixes Critical Stored XSS Error in Akismet
  647. Shocker: Net anarchist builds sneaky 220v USB stick that fries laptops
  648. You can hack a PC just by looking at it, say 3M and HP
  649. Cash Reward For Google.com Takeover Man
  650. Hackers Can Steal Your Brain Waves
  651. Half Of IRS's Servers Still Run Doomed Windows Server 2003
  652. Hackers Can Silently Control Siri From 16 Feet Away | WIRED
  653. 87% of Android devices are exposed to at least one critical vulnerability
  654. 'Fixed' app that fights parking tickets blocked in 3 cities
  655. Ongoing Flash Vulnerabilities, (Thu, Oct 15th)
  656. Scottrade Breach Affects 4.6 Million Customers
  657. Experian Breach Spills Data on 15 Million T-Mobile Customers
  658. Targeted Attack Exposes OWA Weakness
  659. Canceled Talk Re-Ignites Controversy Over Legitimate Security Research
  660. How A Single Car Could Spread Malware To Thousands More
  661. Home Routers Vaccinated By Benign Virus
  662. Edward Snowden Fails At Twitter And Notification Settings
  663. Data Easily Recovered From eBayed Smartphones, Disks
  664. Autonomous Vehicles as Bombs
  665. Whats in a Boarding Pass Barcode? A Lot
  666. Amazon AWS Web Application Firewall (WAF ) Launched
  667. Threatening to post a sex tape on Facebook isn't a crime, US court rules
  668. Information in Your Boarding Pass's Bar Code
  669. Stagefright 2.0 Vuln Affects Nearly All Android Devices
  670. Shell Shock Labs: [Part 1[EN] Hacking NETGEAR JWNR2010v5 Router - Authentication Bypass]
  671. Terminal escape sequences - the new XSS for Linux sysadmins
  672. The Inside Story Behind MS08-067 - Defender Mindset - Site Home - TechNet Blogs
  673. Jump ESP, jump!: How I hacked my IP camera, and found this backdoor account
  674. Week 39 In Review 2015
  675. Mistakenly-deployed test patch leads to suspicious Windows update , (Wed, Sep 30th)
  676. Apple removes iPhone app that reports US drone strikes
  677. State Trooper Vehicles Hacked
  678. Microsoft's enterprise-grade security is coming to Windows 10 IoT
  679. D-Link Accidentally Leaks Private Code-Signing Keys
  680. Unsupported Honeywell Experion PKS Vulnerable to Public Attacks
  681. Monica Lewinsky lawyer named as first outsider on secret US spy court
  682. It's baaaack: Stagefright 2.0 0day hoses all Android devices
  683. Poker Players Targeted By Card-Watching Malware
  684. Two-Week Old WordPress Malware Attack Is Blossoming Into Real Threat
  685. Security Wares Like Kaspersky Can Make You More Vulnerable To Attacks
  686. 650,000 Chinese Smartphones Used To Launch Ad Network DDoS Attack
  687. Week 37 In Review 2015
  688. How $100 And Knowledge Of Wireless Protocols Could Bring Cities To A Standstill - Forbes
  689. First-ever monthly Android security updates start to roll out | Ars Technica
  690. Microsoft Pushes a Dozen Security Updates Krebs on Security
  691. September 2015 Adobe Shockwave Security Patch | Threatpost | The first stop for security news
  692. Spawning Binds with Bluetooth
  693. Proxying Bluetooth devices for security analysis using btproxy Conor Patrick
  694. thinkst Thoughts...: Canarytokens.org - Quick, Free, Detection for the Masses
  695. attactics[dotorg: Extracting Hashes & Plaintext Passwords from Windows 10]
  696. The Wordpress Plugins Playground, (Mon, Sep 14th)
  697. Hacking Team, Computer Vulnerabilities, and the NSA
  698. Remember those Facebook "Dislike Button" scams? This time it's real...
  699. WordPress Patches Serious Shortcodes Core Engine Vulnerability
  700. Maker Kid Busted for Clock Handcuffed Wearing NASA T-Shirt
  701. Scary, sophisticated malware found attacking Cisco routers
  702. Apple iOS 9 is out with a LOT of security holes patched
  703. Exploiting MS15-100 Vulnerability (CVE-2015-2509)
  704. iOS AirDrop vulnerability allows for malware installation on Apple devices
  705. Self-Destructing Computer Chip
  706. 5 Most Common Firewall Configuration Mistakes
  707. Zero-day vulnerabilities reportedly found in Kaspersky and FireEye security products
  708. 5 Free Security Analytics Tools
  709. Is John McAfee running for US president? 'My campaign manager told me not to comment'
  710. FireEye, Kaspersky Lab Scramble To Fix Bugs In Security Tools
  711. John McAfee Announces He's Running For President
  712. Cops Wardriving To Find MACs Of Stolen Gear
  713. Jessy Irwin on Password Security, Opsec and User Education
  714. Will New Security Features Win Over Windows Users?
  715. 10 things to do before you lose your laptop
  716. GM Took 5 Years To Fix A Full-Takover Hack In Millions Of OnStar Cars
  717. Yahoo! Refuses! To! Fix! Emoticon! Exploit! In! Messenger!
  718. Valasek: Todays Furby Bug is Tomorrows SCADA Vulnerability
  719. Save WiFi: Act Now To Save WiFi From The FCC | Hackaday
  720. espreto/wpsploit GitHub
  721. Yes, they just droned a hacker
  722. How CISOs can beat the information security skills-gap
  723. Victims Of US Government Mega-Breach Still Haven't Been Notified
  724. Ecuador Considered Smuggling Julian Assange In A Bag
  725. Netflix releases reflected XSS audit tool for biz
  726. The myth of the cybersecurity skills shortage
  727. What Windows Update for Business is, and what it is not
  728. Google Patches Critical Vulnerabilities in Chrome 45
  729. Secret Service agent pleads guilty to stealing money from Silk Road dealers
  730. Secret Service agent pleads guilty to stealing money from Silk Road dealers | Ars Technica
  731. Linux Foundation Releases Paranoid Internal Infosec Guide
  732. Goole, Mozilla, Microsoft Are Ending RC4 Support
  733. TSA Master Key Duplication & Why "Security Through (Not So) Obscurity" Fails - TrustedSec - Information Security
  734. ColdFusion Bomb: A Chain Reaction From XSS to RCE - Bishop Fox
  735. How to use Intel AMT and have some fun with Mainboards - Insinuator
  736. Sophisticated Security: What I learned from cracking 4000 Ashley Madison passwords
  737. It's Surprisingly Simple to Hack a Satellite | Motherboard
  738. These hackers warned the Internet would become a security disaster. Nobody listened. | The Washington Post
  739. Web.com Hacked! Credit Card information of 93,000 Customers Compromised
  740. Flash: Web Browser Plugins Are Vulnerable
  741. WordPress Compromises Behind Spike in Neutrino EK Traffic
  742. Patched Ins0mnia Vulnerability Keeps Malicious iOS Apps Hidden
  743. Why is the smart home insecure? Because almost nobody cares
  744. We're Just At The Beginning Of The Auto-Hacking Era
  745. Samsung Smart Fridge Leaves Gmail Logins Open To Attack
  746. Suicides Have Started Over The Ashley Madison Hack
  747. Ashley Madison Leak Reveals Its Ex-CTO Hacked Competing Site
  748. Grsecurity Stable Being Free To All Is Over
  749. Yet another Android security flaw: This time EVERYTHING is affected
  750. DIY Swiss Army Barbie multi-tool is ready for anything
  751. Industrial Control System Owners Unaware of Internet Connectivity
  752. Attackers are hijacking critical networking gear from Cisco, company warns | Ars Technica
  753. Four Often Overlooked Factors to Give Your Security Team a Fighting Chance
  754. Vulnerabilities Identified in Several WordPress Plugins
  755. Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool
  756. Ambient Sound Could Be The New Two-Factor Authentication System
  757. Uber is going on a security hiring binge
  758. Linus Torvalds on the state of software security, the Internet of Things, and the future of Linux - GeekWire
  759. Microsoft Drops Rush Internet Explorer Fix For Remote Code Exec Hole
  760. Zero Day Flaw Found In Mac OS X Yosemite Security Update
  761. Russian hackers accessed Pentagon's unclassified email system
  762. New malware turns your computer into a cellular antenna
  763. Ubiquity Stung $46.7 Million USD In E-Mail Spoofing Fraud
  764. XSS flaw put Salesforce accounts at risk of hijacking
  765. How to hack a Corvette with a text message
  766. It's alive! Patch Tuesday survives for Windows 10
  767. Dropbox Ups Its Security Game With USB Two Factor Authentication
  768. Your BMW Or Benz Could Also Be Vulnerable To That GM OnStar Hack
  769. Lenovo Hit With Criticism Over Second Rootkit-Like Utility
  770. Cisco warns customers about attacks installing rogue firmware on networking gear
  771. Buffer Overflow & Format String Attacks: Basics-Part 1
  772. Critical Remotely Exploitable Bug Haunts BIND
  773. Researchers Manipulate Rifles Precision Targeting System
  774. OwnStar Device Can Remotely Locate, Unlock, and Start GM Cars
  775. Goodbye Internet Explorer, Hello Edge
  776. Under 18s should get the right to remove themselves from the internet
  777. Researchers Hack Air-Gapped Computer With Cell Phone
  778. Gamers Steaming Over Dumb Valve Password Vuln
  779. Major Flaw In Android Phones Would Let Hackers In With Just A Text
  780. Security Industry Failing To Keep Pace With Hacker Innovation
  781. Xen fixes another virtual machine escape bug
  782. Want To Know How Your Board Thinks About Cybersecurity?
  783. Online Cheating Site AshleyMadison Hacked
  784. CVSS for ICS
  785. EFF Hopeful Car Hacking Demo Could Help Yield DMCA Exemption
  786. Hacking Team Claims It Always Sold Strictly Within the Law
  787. Four Zero Days Disclosed in Internet Explorer
  788. Chris Valasek on Car Hacking
  789. WordPress Patches Critical XSS Vulnerability in All Builds
  790. Ashley Madison Hacked: Site For People Who Can't Be Trusted Can't Be Trusted
  791. Adobe And Google Partner To Bolster Flash Security Via Project Zero
  792. Hackers Remotely Kill A Jeep On The Highway For Fun And Profit
  793. Going Too Far to Prove a Point
  794. LifeLock's woes continue as FTC claims violation of 2010 settlement
  795. The Jeep HACK What You Need To Know
  796. New research: Comparing how security experts and non-experts stay safe online
  797. Remotely Hacking a Car While It's Driving
  798. Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical
  799. gizmodo/full (Gizmodo) Apple's Thinking About Showing People Ads Based on Their Bank Balances
  800. Security Support Ends For Remaining Windows XP Machines
  801. Authentication Bypass Bug Hits Siemens Energy Automation Device
  802. Wi-Fi Alliance ushers in new era of intrusive apps
  803. Windows 10: you'll get UPDATES LIKE IT or NOT unless you have Enterprise Edition
  804. Hacking Team: We Were Taken Out By A Government Conspiracy
  805. Third Hacking Team Flash Zero-Day Found
  806. Adobe, MS, Oracle Push Critical Security Fixes
  807. After Flash, what will exploit kits focus on next?, (Thu, Jul 16th)
  808. Celebrity caught on police camera causes Twitter uproar
  809. Software and the bogeyman
  810. Your Wi-Fi Networks Soft Underbelly
  811. DMZ and Headless Chickens
  812. Finnish Decision is Win for Internet Trolls
  813. The Risks of Mandating Backdoors in Encryption Products
  814. Infamous Hacking Team Has Been Hacked
  815. Steer Clear Of Low-Tech Hacks: How To Keep Your Information Safe
  816. Ford's 400,000 Car Recall Could Be Tip Of An Auto Security Iceberg
  817. Adobe Tackles New Flash Threat After Hacking Team Leak
  818. Yet Another High Severity Bug Found In OpenSSL
  819. Three UK Politicians 'Hacked' Using Insecure WiFi
  820. Amazon just wrote a TLS crypto library in only 6,000 lines of C code
  821. Attackers Revive Deprecated RIPv1 Routing Protocol in DDoS Attacks
  822. Adobe patches zero-day Flash Player flaw used in targeted attacks
  823. Default SSH Key Found In Many Cisco Appliances
  824. Hundreds of Dark Web sites cloned and "booby trapped"
  825. Apple lets rip with update spate: OS X, iOS, Safari, iTunes, QuickTime
  826. TV's newest hacker drama "Mr. Robot" is technically sound, morally ambiguous
  827. Windows 10 Wi-Fi Sense feature shares your Wi-Fi network with your friends
  828. CyberUL is a dumb idea
  829. The disruptive effect of open-source startups
  830. US Navy caught trying to buy zero-day security flaws
  831. LinkedIn Goes Public with Its Private Bug Bounty
  832. Youre as secure as your apps developers allow them to be
  833. Wi-Fi Hacker Case Reveals Risks Faced By Home Users
  834. The Cardinals May Have Hacked The Astros
  835. EFF, ACLU Appeal License Plate Reader Case To California Supreme Court
  836. PowerShell the Blue Team - Windows PowerShell Blog - Site Home - MSDN Blogs
  837. HackerOne Connects Hackers With Companies, and Hopes for a Win-Win - The New York Times
  838. Research on The Trade-off Between Free Services and Personal Data
  839. Google launches Android bug bounty program
  840. Apple OS X and iOS in the vulnerability spotlight - meet "CORED," also known as "XARA"
  841. Should I panic because Lastpass was hacked?
  842. Hack Of LastPass Exposes Hashed Master Passwords
  843. Americans Resigned To Giving Up Their Privacy, Says Study
  844. Hacker Can Send Fatal Dose To Hospital Drug Pumps
  845. iOS 9 Users To Use 6 Digit Passcodes And 2-Step Auth
  846. Who's behind mysterious flights over US cities? FBI - CSMonitor.com
  847. USA Freedom Act Passes: What We Celebrate, What We Mourn, and Where We Go From Here | Electronic Frontier Foundation
  848. Nmap Development: Sourceforge Hijacks the Nmap Sourceforge Account
  849. Users with weak SSH keys had access to GitHub repositories for popular projects | ITworld
  850. Full Disclosure: More than 60 undisclosed vulnerabilities affect 22 SOHO routers
  851. OpenSesame - hacking garages in seconds
  852. Apple Moving to 2FA, Six-Digit Passcodes in iOS 9
  853. The Promises And Perils Of The Healthcare Internet Of Things
  854. [webapps - WordPress zM Ajax Login & Register Plugin 1.0.9 Local File Inclusion]
  855. [webapps - Wordpress Really Simple Guest Post <= 1.0.6 - File Include]
  856. What's the state of iPhone PIN guessing
  857. [webapps - WordPress Encrypted Contact Form Plugin 1.0.4 - CSRF Vulnerability]
  858. Sniffing and tracking wearable tech and smartphones
  859. An Exploit Kit dedicated to CSRF Pharming | Malware don't need Coffee
  860. Exploit Kit Delivers Pharming Attacks Against SOHO Routers | Threatpost | The first stop for security news
  861. moha99sa/EvilAP_Defender GitHub
  862. Cyber insurance: Only fools rush in | ITworld
  863. Cyber insurance: Only fools rush in | ITworld
  864. Google Online Security Blog: New Research: Some Tough Questions for Security Questions
  865. [webapps - IPLINK IP-DL-801RT-B - (Url Filter Configuration Panel) Stored XSS]
  866. Slew of Vulnerabilities Found in D-Link Storage Devices
  867. Microsoft Windows 10: Three Security Features To Know About
  868. Board Rooms Becoming More Security-Savvy
  869. Script tool a Docker shocker blocker
  870. New Exploit Leaves Most Macs Vulnerable To Permanent Backdooring
  871. New SOHO router security audit uncovers over 60 flaws in 22 models
  872. 95% Of Weapons, Explosives Missed In TSA Tests
  873. IoT Devices Hosted On Vulnerable Clouds In 'Bad Neighborhoods'
  874. The Dark Web Drug Lords Who Got Away
  875. Microsoft accidentally announced its new WiFi service
  876. IoT DANGERS: BYODs trashier cousin becoming a right tearaway
  877. Microsoft to Support SSH in Windows
  878. Mad John McAfee: 'Can you live in a society that is more paranoid than I'm supposed to be?'
  879. Branded Vulnerabilities May Change Enterprise Security
  880. Understanding TSA Math
  881. Study: Average Cost Of Data Breach Is $6.5 Million
  882. Password reset sites expose crackable PeopleSoft creds
  883. 1 In 20 Android Apps Hit By Apache Cordova Flaw
  884. Trojanized, info-stealing PuTTY version lurking online
  885. Changes to Export Control Arrangement Apply to Computer Exploits and More | Center for Internet and Society
  886. [2]
  887. Stink Bombs for Riot Control
  888. Possible Wordpress Botnet C&C: errorcontent.com, (Tue, May 26th)
  889. Race Condition Exploit in Starbucks Gift Cards
  890. IRS: Crooks Stole Data on 100K Taxpayers Via Get Transcript Feature
  891. Phones' accelerometers allow you to be tracked on the metro
  892. WordPress FeedWordPress 2015.0426 SQL Injection
  893. WordPress WP Photo Album Plus 6.1.2 Cross Site Scripting
  894. Phantom Menace Hack Strikes Oil Industry
  895. United Airlines Bug Bounty Pays With Miles
  896. Lets Call Stunt Hacking What it is, Media Whoring.
  897. Our Lord of the Flies moment
  898. How I Got Here: Marcus Ranum
  899. Toyota Prius batteries being targeted by car thieves
  900. 1.1 Million Hit In Another BlueCross BlueShield Breach
  901. Security Researchers Wary of Proposed Wassenaar Rules
  902. NetUSB Flaw Puts Millions Of Routers At Risk
  903. 90s-style security flaw puts millions of routers at risk
  904. How your next password could be your brain
  905. The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
  906. Half Of Retail, Healthcare Sites 'Always Vulnerable'
  907. A practical history of plane hacking: Beyond the hype and hysteria
  908. Compromised WordPress sites leaking credentials
  909. Vendors Step Up & Step Down
  910. License Plate Scanners Hidden in Fake Cactus
  911. PHP Hash Comparison Weakness A Threat To Websites, Researcher Says
  912. "Skynet" is real, and it could flag you as a terrorist
  913. Home Automation Software Z-Way Vulnerable to Remote Attacks
  914. Taking A Security Program From Zero To Hero
  915. Heartbleed, eat your heart out: VENOM vuln poisons countless VMs
  916. Home routers co-opted into self-sustaining DDoS botnet
  917. Dan Kaminsky on VENOM
  918. VENOM Vulnerability
  919. Venom Bug Threatens Virtual Machines
  920. Malvertising strikes on dozens of top adult sites | Malwarebytes Unpacked
  921. Netflix Releases FIDO Incident Response Tool
  922. Usbkill Script Can Render Computers Useless
  923. In charge of security? We need to talk...
  924. Would you buy an Ubuntu phone that doubled as a desktop PC?
  925. The Internet of Things will take a beating at DefCon
  926. Vixie Proposes 'Cooling-Off Period' For New Domains To Deter Cybercrime
  927. Infusion pump is hackable but rumours of death are exaggerated
  928. Millions of WordPress websites at risk from in-the-wild exploit
  929. 84,000 Ad Injectors Found Targeting Chrome
  930. Attackers exploit vulnerabilities in two WordPress plugins
  931. How to interview prospective employers
  932. iPad crash grounds dozens of American Airlines flights
  933. Tesla Twitter Account And Website Hijacked, Elon Musk Pwned
  934. Comments considered harmful: WordPress web hijack bug revealed
  935. WordPress Rushes Out Fix For Zero-Day Flaw
  936. Surgery Bot Can Be Hacked To Hack You To Pieces
  937. Note To Vendors: CISOs Don't Want Your Analytical Tools
  938. RSA Highlighted Impending IoT Troubles
  939. How To Crack Many Master Lock Combinations In 8 Tries Or Less
  940. Google Releases Password Alert Extension for Chrome
  941. A Year Later, XSS Vulnerability Still Exists in eBay
  942. WordPress Ecommerce Plugin Vulnerability Details Disclosed
  943. Wi-Fi Woes Continue To Plague Infosec
  944. To Evangelize Security, Get Out Of Your Comfort Zone
  945. Hackers gaining upper hand, security conference told
  946. 6 Most Dangerous New Attack Techniques in 2015
  947. Wi-Fi client vulnerability could expose Android, Linux, BSD, other systems to attacks
  948. CozyDuke Hackers Infiltrate The White House With 'Funny Monkey' Videos
  949. iOS Vulnerability Could Force Devices Into Endless Reboot Loop
  950. Man guns down computer after getting fed up with Blue Screen of Death
  951. Unsolicited Response Podcast: Rios on WhiteScope and Medical Device Security
  952. An Incredibly Insecure Voting Machine
  953. IRC Botnets alive, effective & evolving
  954. Security, Fast and Slow
  955. Reversing Belkins WPS Pin Algorithm
  956. Hacking the D-Link DIR-890L
  957. What the Ridiculous Fuck, D-Link?!
  958. D-Link router patch creates NEW SOHOpeless vuln
  959. Drug Pump's Security Flaw Lets Hackers Raise Dose Limits
  960. Hacked French Network Exposed Its Own Passwords During TV Interview
  961. 8th Grader Charged With Felony For Snagging Password
  962. Snowden's 'Sexy Margaret Thatcher' Password Isn't So Secure
  963. Unpatched 18 Year Old Windows MiTM Vuln Revived
  964. Prosecutors Suspect Man Hacked Lottery Computers
  965. Hackers Could Commandeer New Planes Through Passenger Wi-Fi
  966. SQLite 22 Bugs
  967. WordPress Ajax Store Locator 1.2 SQL Injection
  968. Flaw in WordPress caching plug-in could affect over 1 million sites
  969. Snapchat blocks access to all third-party apps in bid to improve security
  970. Researchers: IoT devices are not designed with security in mind
  971. Hacks On Critical Infrastructure Are More Common Than You Think
  972. Long Live the Botnet
  973. Watcher Passive Web Application Vulnerability Scanner
  974. Court might force US to reveal details of secret WiFi kill switch
  975. FBI warns WordPress users of ISIS threat: Patch and update now
  976. Penetration Testing: Youre Doing it Wrong (?) Part One
  977. Hillarys emails: Deleted but not gone
  978. Hotel WiFi Vuln Puts Guests At Risk
  979. RSA Bans Booth Babes
  980. The US Has Used Zero-Day Exploits For Quite A While
  981. Men Disguised As Women Storm NSA HQ
  982. Uber Denies It Was Hacked
  983. Flaw Deletes YouTube Videos In Just A Few Clicks
  984. Evidence Links China To GitHub Attack
  985. Cross-Site Scripting Vulnerability Discovered In WordPress Photo Gallery Plugin | Fortinet Blog
  986. Rush To Release Resulting In Vulnerable Mobile Apps
  987. Pin-pointing China's attack against GitHub
  988. Remote Code Execution Possible Via Dell System Detect
  989. http://arstechnica.com/security/2015/03/twitch-resets-user-passwords-fol...
  990. https://threatpost.com/cisco-small-business-ip-phones-open-to-remote-eav...
  991. http://arstechnica.com/security/2015/03/all-four-major-browsers-take-a-s...
  992. BIOS Hacking
  993. Maturing Your Vulnerability Management Program Part 1 | Core Security Blog
  994. 5 Ways to a Kick A$$ Vulnerability Management Program-Part 2
  995. Reverse Engineering Incentives
  996. How I hacked my smart bracelet
  997. The Internet Of Bring-Your-Own Things
  998. Researchers Use Heat To Breach Air-Gapped Systems
  999. Wind Turbine Blown Away By Control System Vulnerability
  1000. Romanian Man Extradited To U.S. To Face Hacking Charges
  1001. A $60 Gadget That Makes Car Hacking Far Easier
  1002. Amazon.com Gives Out A T-Shirt For XSS Issue Reported
  1003. Cisco Patches IOS To Stop Automation Exploitation
  1004. Most Companies Expect To Be Hacked In The Next 12 Months
  1005. 10 Ways To Measure IT Security Program Effectiveness
  1006. The End of Pen Testing As We Know It?
  1007. The 7 Best Social Engineering Attacks Ever
  1008. D-Link patches yet more vulns
  1009. Despite what you may have heard, Internet Explorer is not dead
  1010. Black Hat USA 2015: Focus on Infrastructure
  1011. Dont click on the porn video your Facebook friend shared
  1012. Epic Google snafu leaks hidden whois data for 280,000 domains | Ars Technica
  1013. Information Security: A Primer on IoT Security ... | SecurityStreet
  1014. Door Skimmer + Hidden Camera = Profit
  1015. Tool Release CANBus Protector
  1016. OpenSSL Patch to Plug Severe Security Holes
  1017. Top 10 API Security Considerations
  1018. Analysis of a Remote Code Execution Vulnerability on Fortinet Single Sign On
  1019. Double FREAK! A cryptographic bug that was found because of the FREAK bug
  1020. EMET 5.2 is available (update)
  1021. What ever it is, CISA isn't cybersecurity
  1022. Visual Studio VSTFS protocol handler command injection
  1023. Identifying When Someone Is Operating a Computer Remotely
  1024. Full Disclosure: PHPMoAdmin Unauthorized Remote Code Execution (0-Day)
  1025. No Wireshark? No TCPDump? No Problem! - SANS Internet Storm Center
  1026. Tool Release Digital Bond CANBus-Utils Digital Bond's SCADA Security Portal
  1027. DanMcInerney/net-creds GitHub
  1028. Anatomy of a Hack
  1029. Apartment complex threatens residents with $10k fines for negative online reviews
  1030. Patch Tuesday patches FREAK, Universal XSS
  1031. CIA spent last 10 years cracking Apples encryption
  1032. What we know about security features on the Apple Watch
  1033. Panda antivirus labels itself as malware, then borks EVERYTHING
  1034. Mattel urged to scrap Wi-Fi mic Barbie after Register investigation
  1035. Panda antivirus mistakenly flags itself as malware, bricks PCs
  1036. Ford, Toyota and General Motors could be taken to court over hackable cars
  1037. How To Keep Your Smart Home Safe
  1038. Some notes on DRAM (#rowhammer)
  1039. Latest WordPress bug highlights importance of securing the supply chain
  1040. Lizard Squad Hackers Attack Lenovo After Superfish Scandal
  1041. Twitter Triples Abuse Team, Knocks Dox
  1042. US Air Traffic Control Vulnerable To Terrorist Hackers
  1043. D-Link Removes Fingers From Ears, Preps Mass Router Patch
  1044. The C99Shell Is Not Dead
  1045. Abusing Blu-ray Players Pt. 1 Sandbox Escapes | NCC Group
  1046. Pulling Remote Word Documents from RAM using Kali Linux | CYBER ARMS - Computer Security
  1047. w00tsec: Extracting RAW pictures from memory dumps
  1048. albinowax/ActiveScanPlusPlus GitHub
  1049. The two most dangerous IT security sins, that everyone does
  1050. Broadband routers: SOHOpeless and vendors don't care
  1051. Listen to an actual Microsoft support scam as it happened
  1052. How infosec hiring lost its way: Harsh findings in Leviathan report | ZDNet
  1053. Lack of CSPRNG Threatens WordPress Sites | Threatpost | The first stop for security news
  1054. Why We Should Design Some Things to Be Difficult to Use
  1055. Information disclosure flaw exposes Netgear wireless routers to attacks
  1056. Red Hat CEO: Todays IT department is in a fight for its life
  1057. Mozilla's Flash-Killer 'Shumway' Appears In Firefox Nightlies
  1058. BadUSB Vulnerabilities Live in ICS Gear Too
  1059. Youre Not Paranoid, Someone Is Spying on Your Company
  1060. Israel targeted by malware packaged with pornographic video
  1061. Christofer Hoff on Mixed Martial Arts, Active Defense, and Security
  1062. Samsung smart TVs don't encrypt the voice data they collect
  1063. BadUSB Poses Threat to Industrial Control Systems, Says Security Researcher
  1064. Microgrids and Smart Grid Resilience
  1065. End Users Causing Bulk Of Infosec Headaches
  1066. Critical 0-days in open source? The problem isn't code, it's CASH
  1067. Today I Am Releasing Ten Million Passwords
  1068. A Winning Strategy: Must Patch, Should Patch, Can't Patch
  1069. Microsoft Plugs 41 Internet Explorer Flaws
  1070. Chinese Hackers Compromised Forbes.com Using IE, Flash Zero Days
  1071. Hacker kicks one bit XP to 10 Windows scroll goal
  1072. Anthem data breach cost likely to smash $100 million barrier
  1073. Hacker finds vulnerability in Facebook, can delete your photo albums
  1074. Anthem Breach May Have Started in April 2014
  1075. Exploiting BadIRET vulnerability (CVE-2014-9322, Linux kernel privilege escalation) | Bromium Labs
  1076. Microsoft Packing More CVEs into Fewer Security Bulletins
  1077. Nscan: Fast Internet Wide Scanner | Python for Pentesting
  1078. AirPcap Channel Hopping With Python | Didier Stevens
  1079. OWASP Proactive Controls - OWASP
  1080. Droopescan Plugin Based CMS Security Scanner
  1081. The year the security dog caught the car
  1082. D-Link routers vulnerable to DNS hijacking
  1083. Welcome to my sit-stand desk nightmare | Ars Technica
  1084. 3 Disturbing New Trends in Vulnerability Disclosure
  1085. BMW's Software Security Patch A Sign Of Things To Come
  1086. Adobe Flash Zero Days Prove Signatures Are Dead
  1087. Adobe Begins Patching Third Flash Player Zero Day
  1088. Siemens Sighs: SCADA Bugs Abound
  1089. Attackers exploit zero-day flaw in popular WordPress plug-in
  1090. Critical Ghost bug could haunt WordPress and PHP apps, too | Ars Technica
  1091. Security 101: Show Your List!
  1092. Anthem Hacked US Health Insurance Provider Leaks 70 Million Records
  1093. Yet Another Emergency Flash Player Patch Krebs on Security
  1094. The Shadow File: Patching, Emulating, and Debugging a Netgear Embedded Web Server
  1095. GDS - Blog - BadSamba - Exploiting Windows Startup Scripts Using a Malicious SMB Server
  1096. delvelabs/vane GitHub
  1097. WTF! It Should Not Be Illegal To Hack Your Own Car's Computer
  1098. Building A Cybersecurity Program: 3 Tips
  1099. Small Drone Found On White House Lawn
  1100. Android Wi-Fi Direct Vulnerability Details Disclosed
  1101. Mark Dowd finds bug in ultra secure BlackPhone that lets attackers stalk users
  1102. Apple Patches Thunderstrike Bug in OSX, Fixes More Than 30 Flaws in iOS
  1103. Top smut site Flashes visitors, leaves behind nasty virus
  1104. The GHOST vulnerability what you need to know
  1105. Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK | Malware don't need Coffee
  1106. Java Patch Plugs 19 Security Holes Krebs on Security
  1107. Guest Blog: httpscreenshot - A Tool for Both Teams
  1108. Nobody thought BlackPhone was secure -- just securer
  1109. Some notes on GHOST
  1110. Meet Reuben Paul: 8 year old CEO, Cyber Security Ambassador and Haxpo Highlight Speaker
  1111. Had a data breach? Well, SPEAK UP, big biz Obama
  1112. Lizard Squads DDoS-For-Hire Service Built on Hacked Home Routers
  1113. Router creds admin/admin? Lizard Squad thanks you
  1114. Remember Corel? It's just entered .DLL hell
  1115. Insert 'Skeleton Key', unlock Microsoft Active Directory. Simples hackers
  1116. Why on Earth Is IBM Still Making Mainframes?
  1117. Instagram Flashed Your Privates To Picture Pervs
  1118. AMD Plugs Firmware Holes That Allowed Command Injection
  1119. 4 Mega-Vulnerabilities Hiding in Plain Sight
  1120. Warning: Using encrypted email in Spain? Do not pass go, go directly to jail
  1121. It's 2015 and home routers still leave their config web servers wide open
  1122. Security? Don't bother until it's needed says RFC
  1123. Internet of Things promises analytics boom
  1124. Four Disruptive Hacks to Come in 2015
  1125. Marriott Agrees to Stop Blocking Guest WiFi Devices
  1126. The International Conference on PASSWORDS 2014. - NTNU openVideo
  1127. ASUSWRT 3.0.0.4.376_1071 - LAN Backdoor Command Execution
  1128. pwntools CTF Framework & Exploit Development Library
  1129. Ouch! Home router security "bypass" actually means no security AT ALL
  1130. DevOoops: Spoofing GitHub Users
  1131. Obama's War on Hackers
  1132. Attack Attribution in Cyberspace
  1133. Internet of Things is a threat to privacy, says FTC
  1134. Thieves Jackpot ATMs With Black Box Attack
  1135. Thunderstrike shocks OS X with firmware bootkit
  1136. Self-XSS flaw in found Microsoft Dynamics CRM
  1137. OpenSSL Fixes Eight Security Vulnerabilities
  1138. Anybody can take North Korea offline
  1139. IoT Security: How to Protect Applications on the Edge
  1140. The Elephant in the Room is Compliance
  1141. Best Defense Against a Cyber-Attack Is to Know Your Adversary
  1142. Home Wi-Fi security's just as good as '90s PC security! Wait, what?
  1143. Poll: The Perimeter Has Shattered!
  1144. How To Become a CISO: Top Tips
  1145. 5 ways to prepare for Internet of things security threats
  1146. Mobile security top tips for protection for BYOD devices
  1147. New WordPress Password Policy in WP Password Policy Manager Plugin
  1148. 2014: The Year of Shaken Trust
  1149. Internet Of Things: 3 Holiday Gifts That Will Keep CISOs Up At Night
  1150. Employees Still Get More Access Than They Need
  1151. It's nearly 2015 and your Windows PC can still be owned by a Visual Basic script
  1152. Why You Shouldnt Use MAC Address Filtering On Your Wi-Fi Router
  1153. Coming to Blackphone: An app store loaded with privacy tools
  1154. Hacked payment card service transmitted some data in plaintext
  1155. Intel's IoT vision encompasses more than chips
  1156. Belden buys Tripwire for $710m: Will keep network burglars out of Internet of Things things
  1157. Sony Hackers Leak Netflix Deal Info
  1158. Judge Says Banks Can Sue Target (December 4 & 8, 2014)
  1159. Poodle Bug Returns, Bites Big Bank Sites
  1160. Not Enough CISOs to Go Around
  1161. The Sony Picture's Hack: Hollywood's Snowden Moment
  1162. Critical Remote Code Execution Flaw Found in WordPress Plugin
  1163. tcpdump multiple security vulnerabilities
  1164. Apache Site Hacked Through SSH Key Compromise
  1165. Sony just got hacked, doxxed, and shut down | News | Geek.com
  1166. Website Security - Protecting The Unknown - Software Vulnerabilities | Sucuri Blog
  1167. DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS The Register
  1168. Do you use SSL/TLS on internal comms?
  1169. Guest diary: Detecting Suspicious Devices On-The-Fly, (Tue, Nov 25th)
  1170. Bugtraq: WordPress 3 persistent script injection
  1171. google/firing-range GitHub
  1172. [DeepSec 2014 Trusting Your Cloud Provider. Protecting Private Virtual Machines Armin Simma | C (in)suit / ChrisJohnRiley]
  1173. [3]
  1174. Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools | Motherboard
  1175. Critical XSS Flaw Affects WordPress 3.9.2 And Earlier
  1176. Apple TV multiple security vulnerabilities
  1177. Remote Code Execution in Popular Hikvision Surveillance DVR
  1178. Don't Discount XSS Vulnerabilities
  1179. Regin: When did protection start?
  1180. Strength in numbers: Why layered network protection is priority
  1181. All Your Base, Encrypted They Are
  1182. Reversing Industrial firmware for fun and backdoors I
  1183. Reversing DELL's DRAC firmware
  1184. Wireless attacks against 'air gapped' targets are possible, Israeli team claims
  1185. You're Doing BYOD Wrong: These Numbers Prove It - Dark Reading
  1186. DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests | WIRED
  1187. BASHLITE Affects Devices Running on BusyBox
  1188. Major iOS security flaw Masque Attack reportedly uncovered, found to pose much bigger threat than WireLurker | 9to5Mac
  1189. Reverse Engineer a Verisure Wireless Alarm part 1 Radio Communications | Fun Over IP
  1190. SANS Digital Forensics and Incident Response Blog | Protecting Privileged Domain Accounts: Restricted Admin and Protected Users | SANS Institute
  1191. HP TippingPoint + Mobile Pwn2Own: Day 2 - HP Enterprise Business Community
  1192. HP TippingPoint + Mobile Pwn2Own = Zero Day Filter... - HP Enterprise Business Community
  1193. Disarming and Bypassing EMET 5.1
  1194. Additional information about CVE-2014-6324
  1195. Week 45 In Review 2014
  1196. BBC News - Pirate Bay co-founder 'TiAMO' arrested in Thailand
  1197. Chertoff Reminds Enterprises There is Hope in Security
  1198. WireLurker Malware Infects iOS and OS X
  1199. Whois someone else?, (Tue, Nov 4th)
  1200. Password hash disclosure in Linksys Smart WiFi routers | Weblog | Sijmen Ruwhof
  1201. Smeege Sec: Detecting and Exploiting the HTTP PUT Method
  1202. How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper | Cyber Security Labs @ Ben-Gurion University of the Negev
  1203. Reversing D-Links WPS Pin Algorithm
  1204. NSA-Approved Samsung Knox Stores PIN in Cleartext | Threatpost | The first stop for security news
  1205. Watch That Windows Update: FTDI Drivers Are Killing Fake Chips
  1206. Symantec Intelligence Report: September 2014 | Symantec Connect
  1207. [SecTorCA Reverse Engineering a Web Application for fun, behavior & WAF Detection | C (in)suit / ChrisJohnRiley]
  1208. Hacking with the Oldies!, (Thu, Oct 30th)
  1209. 3 ways to make your Gmail account safer | Naked Security
  1210. Millions of Drupal websites at risk from failure to patch
  1211. telnetd rulez: Cisco Ironport WSA Telnetd Remote Code Execution Vulnerability, (Wed, Oct 22nd)
  1212. Google goes beyond two-step verification with new USB Security Key
  1213. Leave your passwords at the Checkout Desk
  1214. Hackers hold 7 million Dropbox passwords ransom - CNET
  1215. snapchat-decrypt/README.md at master programa-stic/snapchat-decrypt GitHub
  1216. Index of /hitbsecconf2014kul/materials
  1217. SIM Card Forensics | 0xicf
  1218. Meet the NSAs hacker recruiter
  1219. Yahoo Servers Were Owned By Bash Bug Hackers
  1220. nullcon Goa 2014: Pentesting Proprietary RF Communications by Justin Searle @meeas - YouTube
  1221. The Best DerbyCon 2014 Talks for Red Teams | Strategic Cyber LLC
  1222. Protocol Differential Analysis
  1223. Some POODLE notes
  1224. Microsoft Patches Critical Windows, .NET Zero Day Flaws
  1225. Drupal Fixes Highly Critical SQL Injection Flaw
  1226. Russian Hackers Made $2.5B Over The Last 12 Months
  1227. Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
  1228. Man bites dog: HTTPS-menacing POODLE is 'hard to exploit' unless you're on public Wi-Fi
  1229. Anonabox Kickstarter Project Raises Controversy At Reddit
  1230. Smart Meters Can Be Hacked To Cut Power Bills
  1231. BadUSB Update
  1232. OpenSSL Releases Patch for POODLE Attack
  1233. SSLv3 POODLE Vulnerability Official Release, (Tue, Oct 14th)
  1234. Who ya gonna call? Ghostbusters cosplayers at NYCC
  1235. How Retail Can Win Back Consumer Trust
  1236. Android SMS worm Selfmite returns, more aggressive than ever
  1237. Who named "shellshock"?
  1238. Wget off the leash
  1239. Why (Cyber) Insurance Is Sexy
  1240. Medical Records For Sale in Underground Stolen From Texas Life Insurance Firm
  1241. In Home Depot Breach, Investigation Focuses on Self-Checkout Lanes
  1242. Top 10 Security Issues for REST APIs
  1243. Mucking About With SquashFS
  1244. Meet The Next Next-Gen Firewall
  1245. 7 Reasons To Love Passwords
  1246. Why hackers may be stealing your credit card numbers for years
  1247. Apple blames 'targeted attack' for leaked nude celebrity photos
  1248. Rich Mogull on Apple Pay
  1249. Hacker "weev" has left the United States
  1250. Protecting yourself against the celebrity iCloud hackers
  1251. Identifying Firewalls from the Outside-In. Or, "There's Gold in them thar UDP ports!", (Thu, Sep 4th)
  1252. Scared of brute force password attacks? Just 'GIVE UP' says Microsoft
  1253. Twitter offers a $140 bug bounty reward- The Inquirer
  1254. Some Cable Modems Found to Leak Sensitive Data Via SNMP
  1255. Hackers exploit critical vulnerability in popular WordPress theme component
  1256. One in Five Massachusetts Residents Breached in 2013
  1257. Feared Home Depot Breach Sparks More Interest in Backoff PoS Malware
  1258. Threats in Custom App Development: Enterprises Lack of Security
  1259. Wi-Fi Sense?
  1260. How I Hacked My Home, IoT Style
  1261. 10 Common Software Security Design Flaws
  1262. Backoff, Dairy Queen, UPS & Retail's Growing PoS Security Problem
  1263. Netflix releases home-grown DDoS detectors
  1264. Researchers camouflage haxxor traps with fake application traffic
  1265. Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections
  1266. Why Are Security Pros Blase About Compliance?
  1267. SSDP Amplification Scanner
  1268. Secure Development - One Bathroom Break At A Time
  1269. Masscan does STARTTLS
  1270. Retired US airport body scanners fail to spot guns, knives
  1271. Security of 'Things'
  1272. Researchers find its terrifyingly easy to hack traffic lights | Ars Technica
  1273. UPS Admits 51 Stores Hit With Malware For Five Months
  1274. BuildItSecure.ly - Securing the "Internet of Things", Together.
  1275. Internet Of Things Security Reaches Tipping Point
  1276. Why you need to do less if you want better security
  1277. The biggest iPhone security risk could be connecting one to a computer | Network World
  1278. Study finds firmware plagued by poor encryption and backdoors | PCWorld
  1279. Home routers supplied by ISPs can be compromised en masse - Computerworld
  1280. ISP-Supplied Home Routers Could be Compromised Through Protocol That Allows Remote Troubleshooting (August 10, 2014)
  1281. Good bot, bad bot? 23 million Twitter accounts are automated
  1282. BadUSB, keynote controversy: Black Hat USA 2014 videos now online
  1283. Your cons are just an excuse to drink and party
  1284. Free Wi-Fi - but it'll cost you your privacy
  1285. 3 security mistakes small companies make and how to avoid them
  1286. A Honeypot for home: Raspberry Pi, (Thu, Jul 31st)
  1287. General Availability for Enhanced Mitigation Experience Toolkit (EMET) 5.0
  1288. The Fundamental Insecurity of USB
  1289. Another Potential Retail Mega Breach At Sandwich Chain Jimmy Johns
  1290. Some Thoughts on Verizon DBIR
  1291. Binwalk v2.0 Released!
  1292. More fun with #TSA
  1293. [webapps - NETGEAR DGN2200 1.0.0.29_1.7.29_HotS - Password Disclosure vulnerability]
  1294. Four Steps to Successfully Implementing Security into a Continuous Development Shop
  1295. For Java: I Patch, Therefore I Am?
  1296. Active Directory Vulnerability Disclosure: Weak encryption enables attacker to change a victims password without being logged - Aorato
  1297. Car Hacker's Handbook
  1298. Fingerprinting Computers By Making Them Draw Images
  1299. "Password Storage Mistakes"
  1300. Can I use Dropbox?
  1301. On Mobile Device ICS App Security
  1302. Securing the Nest Thermostat
  1303. WordPress brute force attack via wp.getUsersBlogs, (Tue, Jul 22nd)
  1304. Car hackers build anti-car-hacking gadget
  1305. Firefox 31 has arrived - 11 bulletins, 3 critical, 0 visual surprises
  1306. New Feature: "Live" SSH Brute Force Logs and New Kippo Client, (Wed, Jul 23rd)
  1307. Thoughts on BrutPOS
  1308. Pre-order Your Copy of Spam Nation Now!
  1309. Please update Flash on your systems
  1310. This Common Home Appliance Can Compromise Your Entire Security
  1311. 10 Powerful Facts About Big Data - InformationWeek
  1312. Zendesk Insights Shows Its A Data-Driven World
  1313. Intrusive Healthcare
  1314. 6 Tips for Using Big Data to Hunt Cyberthreats
  1315. Etsys Threat Modeling
  1316. As security startups heat up, a reminder that security is not a product or service: its a value Tech News and Analysis
  1317. Penetration Testing Scripts | Common Exploits - Penetration Testing Information
  1318. Episode #179: The Check is in the Mail
  1319. Remote Access Hack Compromises POS Vendor | Threatpost | The first stop for security news
  1320. Mysterious cyberattack compromises more than a thousand power plant systems | The Verge
  1321. Attackers poison legitimate apps to infect sensitive industrial control systems | Ars Technica
  1322. Burp Suite Tutorial Web Application Penetration Testing (Part 1)
  1323. Locking down PHP
  1324. OpenSSL describes its own sad state of affairs
  1325. Netflix Open Sources AWS Monitoring Tool: Security Monkey!
  1326. Living Up To Rock Star Status
  1327. How to Become a PMP
  1328. Exploding Cigarettes and AppSec
  1329. Plaintext Supermicro IPMI Credentials Exposed
  1330. Why A Secured Network Is Like The Human Body
  1331. Patched Code-Execution Bug Affects Most Android Users
  1332. Got a botnet? Thinking of using it to mine Bitcoin? Don't bother
  1333. Major SSL flaw found in iOS, OS X
  1334. Own goal as World Cup Wi-Fi passwords spilled in newspaper snap
  1335. SCADA/ICS Systems Under Attack In Europe Stuxnet-Style
  1336. Puppet Dashboard Multiple XSS Vulnerabilities
  1337. Asterisk PJSIP Channel Driver Multiple DoS Vulnerabilities (AST-2014-005 / AST-2014-008)
  1338. Asterisk HTTP Session Handling DoS (AST-2014-007)
  1339. Asterisk Manager Interface MixMonitor Privilege Escalation (AST-2014-006)
  1340. Brocade Fabric OS Default Credentials
  1341. Participants Database Plugin for WordPress query Parameter SQL Injection
  1342. Participants Database Plugin for WordPress < 1.5.4.9 query Parameter SQL Injection
  1343. Cisco TelePresence Supervisor MSE 8050 Multiple Vulnerabilities in OpenSSL
  1344. Cisco TelePresence MCU Series Devices Multiple Vulnerabilities in OpenSSL
  1345. Cisco ONS 15400 Series Devices Multiple Vulnerabilities in OpenSSL
  1346. Cisco Windows Jabber Client Multiple Vulnerabilities in OpenSSL
  1347. Cisco Adaptive Security Appliances Multiple Vulnerabilities in OpenSSL
  1348. Cisco ACE30 and ACE4710 OpenSSL 'ChangeCipherSpec' MiTM Vulnerability
  1349. Cisco Unsupported ACE Module Detection
  1350. Cisco TelePresence Supervisor Detection
  1351. Junos Pulse Secure Access IVE / UAC OS Multiple OpenSSL Vulnerabilities (JSA10629)
  1352. McAfee Web Gateway Multiple OpenSSL Vulnerabilities
  1353. McAfee ePolicy Orchestrator Multiple OpenSSL Vulnerabilities
  1354. Symantec Web Gateway < 5.2.1 Multiple Vulnerabilities (SYM14-010)
  1355. Cogent DataHub < 7.3.5 Multiple Vulnerabilities
  1356. AlienVault OSSIM 'av-centerd' Remote Code Execution
  1357. OSSIM SOAP Service Detection
  1358. Default Password (f00b@r) for 'root' Account
  1359. Countertack Sentinel User Interface Detection
  1360. Countertack Sentinel Detection
  1361. Havex Hunts For ICS/SCADA Systems - F-Secure Weblog : News from the Lab
  1362. Cisco Security Advisory: Undocumented Test Interface in Cisco Small Business Devices
  1363. Ten Years Later, Cabir Worm's Place in History is Unique | Threatpost | The first stop for security news
  1364. Black Hat USA 2014: Embedded & Vulnerable
  1365. Tavis Ormandy finds an embarrassing hole In more Microsoft products
  1366. Research Project Pays People to Download, Run Executables
  1367. Gear to Block Juice Jacking on Your Mobile
  1368. Ransomware with a happy ending | Naked Security
  1369. Vixie: Open Internet is Slowly Poisoning Us
  1370. Hacking the DSP-W215, Again, Again, Again
  1371. Hacking the DSP-W215, Again, Again
  1372. Hacking the DSP-W215, Again
  1373. Products endorsed by cybersec experts
  1374. Passive OS Detection Report
  1375. OpenSSL ChangeCipherSpec Dashboard
  1376. Samba < 3.6.20 / 4.0.11 / 4.1.1 Multiple Vulnerabilities
  1377. Citrix XenServer Windows Guest Tools Remote DoS
  1378. Citrix XenServer Tools Detection
  1379. Unsupported ScreenOS Operating System
  1380. IBM Tivoli Directory Server 6.0.x / 6.1 < 6.1.0.58 / 6.2 < 6.2.0.33 / 6.3 < 6.3.0.25 Javadoc Frame Injection
  1381. EMC Documentum D2 Privilege Escalation
  1382. Juniper ScreenOS 5.4 < 5.4.0r28 / 6.2 < 6.2.0r18 / 6.3 < 6.3.0r16 Malformed ICMP Echo Request DoS (JSA10604)
  1383. Juniper ScreenOS 5.4.x < 5.4.0r12 / 6.1.x / 6.2.x < 6.2.0r2 'about.html' Information Disclosure
  1384. Juniper ScreenOS < 5.4.0r10 / 6.0 < 6.0.0r6 / 6.1 < 6.1.0r2 Web Interface and Telnet Login Pages XSS (JSA10388)
  1385. OpenSSL 1.0.1 < 1.0.1h Multiple Vulnerabilities
  1386. OpenSSL 0.9.8 < 0.9.8za Multiple Vulnerabilities
  1387. Opera < 22 Multiple Chromium Vulnerabilities
  1388. Ubuntu 13.10 : linux vulnerabilities (USN-2241-1)
  1389. They Hack Because They Can
  1390. Botnets coming soon to a smart home or automated building near you
  1391. Linksys E4200 Vulnerability Enables Authentication Bypass
  1392. Vulnerabilities in IPMI Protocol Have Long Shelf Life
  1393. gizmodo/full (Gizmodo) How Teen Hackers Were Portrayed In 1980s Family Magazines
  1394. Critical OpenSSL Patch Available. Patch Now!, (Thu, Jun 5th)
  1395. New OpenSSL MITM Flaw Affects All Clients, Some Server Versions
  1396. Back To Basics
  1397. Hackers Infiltrate Desk Phones For Epic Office Pranks
  1398. CVE Iterator Report
  1399. OWASP Top 10
  1400. Passive OS Detection
  1401. SCAP Audit Summary Report
  1402. Stealer Malware
  1403. FireEye Status Dashboard
  1404. Mac OS X < 10.9.3 Multiple Vulnerabilities (Security Update 2014-002)
  1405. Mozilla Thunderbird 17 Script Execution in HTML Mail Replies
  1406. AppleTV < 6.1.1 Multiple Vulnerabilities
  1407. RTMP Connection Detection
  1408. Apple iOS 7.x < 7.1.1 Multiple Security Vulnerabilities
  1409. RTMP Connection Detection
  1410. PC Duo Detection
  1411. PC Duo Detection
  1412. Multicast Source Discovery Protocol Client Detection
  1413. Samba < 3.6.23 / 4.0.16 / 4.1.6 Multiple Vulnerabilities
  1414. McAfee ePolicy Orchestrator OpenSSL Information Disclosure (Heartbleed)
  1415. Mac OS X : Safari < 6.1.4 / 7.0.4 Multiple Vulnerabilities
  1416. IBM Domino 9.0.0 < 9.0.0 Interim Fix 4 iNotes Buffer Overflow (credentialed check)
  1417. IBM Domino 8.5.3 < 8.5.3 Fix Pack 5 Interim Fix 1 iNotes Buffer Overflow (credentialed check)
  1418. IBM Domino 9.0 < 9.0.0 Interim Fix 4 iNotes Buffer Overflow
  1419. IBM Domino 8.5.x < 8.5.3 Fix Pack 5 Interim Fix 1 iNotes Buffer Overflow
  1420. Western Digital Arkeia lang Cookie Crafted Local File Inclusion
  1421. Western Digital Arkeia lang Cookie Local File Inclusion
  1422. Western Digital Arkeia Virtual Appliance Unsupported Version Detection
  1423. Western Digital Arkeia Virtual Appliance Blank Password
  1424. Default Password (arkeia) for 'root' Account
  1425. Western Digital Arkeia Virtual Appliance Detection
  1426. IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.2 Multiple Vulnerabilities
  1427. RHEL 6 : gnutls (RHSA-2014:0595)
  1428. RHEL 5 : gnutls (RHSA-2014:0594)
  1429. Oracle Linux 6 : gnutls (ELSA-2014-0595)
  1430. Oracle Linux 5 : gnutls (ELSA-2014-0594)
  1431. FreeBSD : gnutls -- client-side memory corruption (027af74d-eb56-11e3-9032-000c2980a9f3)
  1432. IBM WebSphere Portal Apache Commons FileUpload DoS
  1433. PHP 5.5.x < 5.5.13 'src/cdf.c' Multiple Vulnerabilities
  1434. PHP 5.4.x < 5.4.29 'src/cdf.c' Multiple Vulnerabilities
  1435. Sendmail < 8.14.9 close-on-exec SMTP Connection Manipulation
  1436. Coolest Companies: Baltimore
  1437. Your devices Heartbleeding - again
  1438. 'Son Of Heartbleed' Hits Android And WiFi Networks
  1439. Your car is a giant computer - and it can be hacked
  1440. How I Got Here: Joe Grand
  1441. New attack methods can 'brick' systems, defeat Secure Boot, researchers say
  1442. Compliance: The Surprising Gift Of Windows XP
  1443. Linux users at risk as ANOTHER critical GnuTLS bug found The Register
  1444. 5 lessons from companies that get computer security right
  1445. Security Manager's Journal: We manage our threats, but what about our vendors?
  1446. Safely Storing User Passwords: Hashing vs. Encrypting
  1447. [webapps - D-Link Routers - Multiple Vulnerabilities]
  1448. What You Need To Know to Become a Penetration Tester
  1449. Can I drop a pacemaker 0day?
  1450. Mimikatz Against Virtual Machine Memory Part 1
  1451. [papers - TP-Link TD-W89 Config File Download / Exploiting the Host]
  1452. Nagios and NPRE
  1453. WordPress: unsafe at any speed
  1454. I Forgot My Wallet. Can I Borrow Yours?
  1455. LulzSec leader sentenced to time served after cooperating with police
  1456. That Snowden chap was SPOT ON says China
  1457. I saved Pinterest's business and all I have to show for it is a t-shirt
  1458. Windows XP hack resurrects patches for retired OS
  1459. Siemens Fixes DoS Flaw in Rugged OS Devices
  1460. Half Of eBay Users No Longer Trust It After Breach
  1461. Google To Have Botnet Of Cars
  1462. Black Hat USA 2014: Focus on Reverse Engineering
  1463. HackerOne Bug Bounty Platform Lands Top Microsoft Security Expert
  1464. TrueCrypt turmoil latest: Bruce Schneier reveals what he'll use instead
  1465. No, you can't remotely turn on phones
  1466. Why You Should Ditch Adobe Shockwave
  1467. Disclosing vs. Hoarding Vulnerabilities
  1468. Weev invoices feds for kidnapping him for 3 years
  1469. Another Site Breached - Time to Change your Passwords! (If you can that is), (Thu, May 22nd)
  1470. Locked In: Keeping Your Enterprise Encryption Keys in Order
  1471. Internet Explorer Zero Day Report
  1472. Cloud Storage Executive Report
  1473. Nessus Scan Report (Top 5)
  1474. Web Activity Report
  1475. CVSS Exploitability (E) and Remediation Level (RL) Risk Matrices
  1476. Cloud Storage
  1477. CVSS Temporal Risk Heat Map
  1478. Web Activity
  1479. CVSS Temporal Ratio
  1480. Google Chrome < 34.0.1847.131 (Mac) Multiple Vulnerabilities
  1481. Google Chrome < 34.0.1847.131 (Windows) Multiple Vulnerabilities
  1482. Google Chrome < 34.0.1847.132 (Linux) Multiple Vulnerabilities
  1483. Xerox Supernode Discovery Client Detection
  1484. Mozilla Firefox for Android < 24.0 Shared Library Loading Vulnerability
  1485. Mozilla Firefox for Android < 29.0 Addressbar/Phishing Vulnerability
  1486. Opera < 21.0 Multiple Vulnerabilities
  1487. Microsoft Internet Explorer 6 through 11 Arbitrary Code Execution
  1488. ISC BIND 9.10.0 Recursive Nameserver Denial of Service Vulnerability
  1489. Google Chrome < 34.0.1847.137 (Mac) Multiple Vulnerabilities
  1490. IWARP Server Detection
  1491. Twitch TV Client Detection
  1492. Mac iCal Client Detection
  1493. IWARP Client Detection
  1494. mDNS Query Response
  1495. AppleTV Detected
  1496. iTunes < 11.2.1 Insecure Permissions Local Privilege Escalation
  1497. InduSoft Web Studio < v7.1 + SP2 + P2 Security System Vulnerability
  1498. Schneider Electric SCADA Expert ClearSCADA 2013 R1 < 2013 R1.2 Remote Denial of Service Vulnerability
  1499. nginx 1.5.10 SPDY Memory Corruption
  1500. ESXi 5.5 < Build 1746974 / 5.5 Update 1 < Build 1746018 OpenSSL Library Multiple Vulnerabilities (including Heartbleed) (remote check)
  1501. ISC BIND 9 Recursive Server prefetch DoS
  1502. iTunes < 11.2.1 User Directory Insecure Permissions Vulnerability (Mac OS X)
  1503. iTunes < 11.2.1 User Directory Insecure Permissions Vulnerability (uncredentialed check)
  1504. Multiple Vendor SNMP public Community String Information Disclosure
  1505. Mac OS X : OS X Server < 3.1.2 Heap-Based Buffer Overflow
  1506. Google Chrome < 35.0.1916.114 Multiple Vulnerabilities (Mac OS X)
  1507. Google Chrome < 35.0.1916.114 Multiple Vulnerabilities
  1508. EZPZ One Click Backup Plugin for WordPress cmd Parameter Remote Command Execution
  1509. Bugzilla 2.0 < 4.4.3 / 4.5.3 Login Form XSRF
  1510. Bugzilla 2.0 < 4.0.12 / 4.2.8 / 4.4.3 / 4.5.3 Character Spoofing
  1511. FortiWeb < 5.2.0 Multiple XSRF Vulnerabilities
  1512. BlackBerry < 10.2.0.1443 Multiple Vulnerabilities
  1513. Good Ol SQLi Used to Hack Naval Database from Nuclear Carrier
  1514. How to wiretap a country
  1515. Bitly Installs Two-Factor Security After Insider Account Compromise
  1516. Why Your Router Is A Security Risk & How To Fix It
  1517. Schneider Electric asks users to patch Heartbleed again
  1518. Another Internet Explorer Zero Day Surfaces
  1519. Why is eBay burying news of its security breach from its users?
  1520. Hacking the D-Link DSP-W215 Smart Plug
  1521. eBay Urges Password Changes After Breach Krebs on Security
  1522. Brown HIV researchers make Dropbox secure with nCrypted Cloud
  1523. Target, Gap, other retailers join to share cyberthreat data
  1524. Penetration Testing Has Come Of Age Now Its Time to Move On | M-unition
  1525. Bitly hackers stole user credentials from offsite database backup
  1526. [4]
  1527. Moar Shellz!
  1528. carmaa/inception GitHub
  1529. BugsCollector | Web security tricks
  1530. Computer Forensics in Fiction
  1531. NetSec
  1532. Linux "got root" kernel bug patched after five years at large
  1533. Kippo Users Beware: Another fingerprinting trick, (Wed, May 14th)
  1534. Google opens up Glass to the US masses for $1,500 a pair
  1535. Is that Twitter account a bot? Researchers make app to find out
  1536. Don't let hackers know Mandiant founder checks his email on an iPad. Oh.
  1537. Deactivated User Accounts Die Hard
  1538. Dropbox finally fixes security vulnerability
  1539. SHA-2 Takes Off, Thanks To Heartbleed
  1540. Why Threat Intelligence Is Like Teenage Sex
  1541. Your Android phone viewed illegal porn. To unlock it, pay a $300 fine
  1542. Google acquires restaurant website builder Appetas
  1543. Serious security flaw in OAuth, OpenID discovered
  1544. McAfee accused of McSlurping Open Source Vulnerability Database The Register
  1545. Unix find Cheat Sheet
  1546. 300k servers vulnerable to Heartbleed one month later
  1547. New iPhone lock screen flaw gives hackers full access to contact list data
  1548. Google stops scanning Gmail messages for ads in Apps for Education - Network World
  1549. Hacking Traffic Systems for Fun and Chaos
  1550. Windows XP Systems Also Get Out-of-Band IE Zero-Day Patch
  1551. Popular Ad Blocker Drops Support for IE6 and IE7
  1552. What a Toilet Hoax Can Tell Us About the Future of Surveillance - Jennifer Golbeck - The Atlantic
  1553. JTAG Slides
  1554. Fun with IDS funtime #3: heartbleed
  1555. The Rise of the Insider in a Collaborative IT World
  1556. Study finds data moving to cloud, encrypted or not
  1557. AOL Subscriber Data Stolen: You've Got Pwned
  1558. Thief in the night: Stealing in a digital age
  1559. FortiGate Scan Report
  1560. System Configuration Report
  1561. Admin Discovery Report
  1562. Tenable Admin
  1563. Executive Vulnerability Metrics
  1564. Oracle Sun Role Manager Identified
  1565. 9P File Share Client Detection
  1566. 9P File Share Server Detection
  1567. AllMyApps Client Detection
  1568. ArcGIS Client Detection
  1569. Airplay Client Detection
  1570. Anipang Internet Gaming Detection
  1571. 5by5 Media Streaming Detection
  1572. HP Print Server Detection
  1573. Aviator Browser Detection
  1574. Fortinet OpenSSL Information Disclosure
  1575. MaraDNS 1.2.12.06 / 1.3.05 Wildcard Resource Record Remote DoS
  1576. HP LeftHand OS Unmanaged Host Detection
  1577. MS14-020: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)
  1578. OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities
  1579. Ajax Pagination (twitter Style) Plugin for WordPress Local File Inclusion
  1580. Silex USB Device Server Web Configuration Page Empty Password
  1581. CUPS < 1.7.2 is_path_absolute Function XSS
  1582. OpenVPN Installed
  1583. FortiWeb 5.x < 5.0.4 XSS
  1584. Symantec Messaging Gateway 10.x < 10.5.2 Management Console XSS (SYM14-006)
  1585. NAS4Free Web UI Default Credentials
  1586. Oracle OpenSSO Multiple Vulnerabilities (April 2014 CPU)
  1587. Oracle OpenSSO Detection
  1588. Cisco IOS IKE Module DoS
  1589. MS KB2963983: Vulnerability in Internet Explorer Could Allow Remote Code Execution
  1590. MS KB2961887: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  1591. Flash Player for Mac <= 11.7.700.275 / 13.0.0.201 Pixel Bender Component Buffer Overflow (APSB14-13)
  1592. Flash Player <= 11.7.700.275 / 13.0.0.182 Pixel Bender Component Buffer Overflow (APSB14-13)
  1593. Snapchat's Expired Snaps Are Not Deleted, Just Hidden
  1594. Not to be outdone by Microsoft, Adobe announces zero-day exploit patch for Flash
  1595. Dell Automates Driver Downloads with New Driver Pack Catalog
  1596. Human-implanted RFID chips
  1597. Satellite Communications Wide Open To Hackers
  1598. Query to find active vulnerabilities 30 days old or more
  1599. SCAP Audit Summary
  1600. HeartBleed Dashboard
  1601. CVSS Base Risk Host Matrices
  1602. NetFlow Monitor Dashboard
  1603. CVSS Base Risk Matrices
  1604. CUPS < 1.7.2 Reflected Cross-Site Scripting Vulnerability
  1605. Mac OS X : Safari < 6.1.3 / 7.0.3 Multiple Vulnerabilities
  1606. Google Chrome < 34.0.1847.116 Multiple Vulnerabilities
  1607. TLSv1 Traffic Negotiation Detection
  1608. DTLS Heartbeat Negotiation Detection
  1609. DTLS v1.2 Traffic Negotiation Detection
  1610. DTLS v1.0 Traffic Negotiation Detection
  1611. SSL Content-Type Heartbeat Detection
  1612. OpenSSL 1.0.1 < 1.0.1g Multiple Vulnerabilities
  1613. Windows RDP / Terminal Services Detection
  1614. UDP Protocol Detection
  1615. Generic TCP Protocol Detection
  1616. DNSSEC Client Query Detection
  1617. MediaWiki Password Reset Cross-site Request Forgery Vulnerability
  1618. MailStation Server Detection
  1619. TLS v1.1 Traffic Negotiation Detection
  1620. Fortinet Security Device Detection
  1621. AirMail OSX Client Detection
  1622. Social Network Activity Executive Report
  1623. HeartBleed Report
  1624. NetFlow Monitor Report
  1625. Flash Player for Mac <= 11.7.700.272 / 12.0.0.77 Multiple Vulnerabilities (APSB14-09) (Mac OS X)
  1626. Cisco IOS XR ICMPv6 Redirect Denial of Service
  1627. WMI EMET Configuration Enumeration
  1628. BlackBerry < 10.2.0.1055 qconnDoor Buffer Overflow
  1629. Amazon Linux AMI : openssl Information Disclosure Vulnerability (ALAS-2014-320)
  1630. SSL Certificate Chain Contains RSA Keys Less Than 2048 bits (PCI DSS)
  1631. Adobe AIR for Mac <= 4.0.0.1628 Multiple Vulnerabilities (APSB14-09)
  1632. BACnet Protocol Detection
  1633. MediaWiki Unsupported Version Detection
  1634. Amazon Linux AMI Update: kernel / openssh Denial of Service (ALAS-2014-319)
  1635. Notorious troll and hacker Weev has conviction overturned
  1636. OpenSSL: The single line of code that broke online security
  1637. How To Securely Erase Your SSD Without Destroying It
  1638. The security of the most popular programming languages
  1639. Google Might Reward Secure Websites With Better Ranking
  1640. Galaxy S5 Fingerprint Scanner Hacked With Glue Mould
  1641. Organizations suffer SQL Injection attacks, but do little to prevent them
  1642. HD Manufacturer LaCie Admits Yearlong Data Breach
  1643. Windows XP Alive & Well in ICS/SCADA Networks
  1644. Black Hat USA 2014: Pentesting? Thought You'd Never Ask
  1645. Troy Hunt: Everything you need to know about the Heartbleed SSL bug
  1646. Heartbleed
  1647. Difficulty of Detecting OpenSSL Heartbleed Attacks Adds to Problem
  1648. What Have We Learned: OpenSSL Heartbleed Bug
  1649. Not just websites hit by OpenSSL's Heartbleed PCs, phones and more under threat
  1650. "Heartbleed heartache" - should you REALLY change all your passwords right away?
  1651. * Patch Now: OpenSSL "Heartbleed" Vulnerability, (Tue, Apr 8th)
  1652. Heartbleed vendor notifications, (Wed, Apr 9th)
  1653. All things not Heartbleed, (Thu, Apr 10th)
  1654. Brace Yourselves (and your Users / Clients) for Heartbleed SPAM, (Thu, Apr 10th)
  1655. Heartbleed Bug: What Can You Do? Krebs on Security
  1656. Test your server for Heartbleed (CVE-2014-0160)
  1657. existential type crisis : Diagnosis of the OpenSSL Heartbleed Bug
  1658. Prezi got Pwned: A tale of responsible disclosure - Engineering at Prezi
  1659. 42 days to go for XP 8 tips if you arent going to make it
  1660. Meet the next-gen USB cable that could sweep away all others
  1661. Android Botnet Targets Middle East Banks
  1662. Amazon Web Services Combing Third Parties for Exposed Credentials
  1663. DNS-Based Amplification Attacks Key on Home Routers
  1664. What took you so long Apple? 26 remote exec bugs die in OS X Safari
  1665. Google Wants Supreme Court To Rule On Street View Privacy Case
  1666. PCI Status
  1667. Social Network Activity Dashboard
  1668. Council on CyberSecurity 20 Critical Security Controls Dashboard
  1669. Cybersecurity Asset Management
  1670. PVS Trust Relationships
  1671. Cybersecurity Framework Audit Dashboards
  1672. PHP 5.5.x < 5.5.10 Multiple Vulnerabilities
  1673. Apple iOS 7.x < 7.1 Multiple Security Vulnerabilities
  1674. Google Chrome < 33.0.1750.149 Multiple Vulnerabilities
  1675. Flash Player < 11.2.202.341 / 12.0.0.77 Multiple Vulnerabilities
  1676. lighttpd < 1.4.35 Multiple Vulnerabilities
  1677. Synology DiskStation Manager <= 4.3-3827 'value' Parameter SQL Injection Vulnerability
  1678. Google Chrome OS < 33.0.1750.152 Multiple Security Vulnerabilities
  1679. Google Chrome < 33.0.1750.152 (Linux) Multiple Vulnerabilities
  1680. Google Chrome < 33.0.1750.152 (Mac) Multiple Vulnerabilities
  1681. Google Chrome < 33.0.1750.154 (Win) Multiple Vulnerabilities
  1682. OpenSSH < 6.6 Remote Restriction Bypass Vulnerability
  1683. Whitehat Aviator Version Detection
  1684. Sina Weibo Usage Detection
  1685. Mozilla Firefox < 28.0 / ESR version < 24.4 Multiple Vulnerabilities
  1686. Mozilla SeaMonkey < 2.25 Multiple Vulnerabilities
  1687. Mozilla Thunderbird < 24.4 Multiple Vulnerabilities
  1688. Firefox OS < 1.2.2 / 1.3 Directory Traversal Vulnerability
  1689. Firefox OS Detection
  1690. Mozilla Firefox for Android < 28.0 Multiple Vulnerabilities
  1691. Mozilla Firefox for Android < 28.0.1 'file:' Protocol Information Disclosure
  1692. cURL/libcURL 7.x < 7.35.0 Multiple Vulnerabilities
  1693. Canon PIXMA MX722 Information Disclosure Vulnerability
  1694. RuggedCom Rugged Operating System < 4.1 (or 3.11.5 for RS950G) Remote Denial of Service
  1695. Account Weakness Report
  1696. PCI Configuration Report
  1697. Group Management Report
  1698. PVS Detections Executive Report
  1699. TCP Metrics Report
  1700. PVS Detections Report - Top 50 Exploitable Vulnerabilities
  1701. Council on CyberSecurity - Critical Security Controls Report
  1702. PVS Detections Report - Devices and Services
  1703. Top Advice for CISOs
  1704. Marcus Ranum and Anton Chuvakin explore big data and security
  1705. SeaMonkey < 2.25 Multiple Vulnerabilities
  1706. IBM SPSS SamplePower 3.0.1 < 3.0.1 IF2 vsflex8l ActiveX Control Remote Code Execution
  1707. WebSphere MQ 7.5 < 7.5.0.3 Information Disclosure
  1708. ZTE F460 / F660 Cable Modems web_shell_cmd.gch Administrative Backdoor
  1709. IBM WebSphere Portal Tagging Reflected XSS
  1710. IBM WebSphere Portal Unspecified URL Manipulation Arbitrary File Access
  1711. IBM WebSphere Portal Improper Access Control Checks
  1712. Cisco AsyncOS for Email Security Appliances Software Remote Code Execution (CSCug79377)
  1713. Cisco AsyncOS for Content Security Management Appliances Software Remote Code Execution (CSCug80118)
  1714. stunnel < 5.00 PRNG State Security Weakness
  1715. Dell KACE K1000 < 5.5.90547 / 5.4.76849 Arbitrary File Upload and Command Execution
  1716. McAfee Email Gateway Version
  1717. McAfee Email Gateway Multiple Vulnerabilities
  1718. MantisBT 1.1.0 < 1.2.16 Multiple Vulnerabilities
  1719. PHP PHP_RSHUTDOWN_FUNCTION Security Bypass
  1720. Autodesk AutoCAD Detection
  1721. Autodesk AutoCAD < 2014 Multiple Vulnerabilities
  1722. Autodesk AutoCAD DWG Buffer Overflow
  1723. Default Password (ironport) for 'admin' Account
  1724. Default Password (ironport) for 'enablediag' Account
  1725. Cisco Email Security Appliance Web UI Default Credentials
  1726. Cisco Content Security Management Appliance Web UI Default Credentials
  1727. Mobile ATM Attack Uses SMS To Dispense Cash
  1728. GUI Bugs Expose Information Disclosure, Privilege Escalation | Threatpost | The first stop for security news
  1729. Microsoft: 0Day Exploit Targeting Word, Outlook Krebs on Security
  1730. Ephemeral Apps
  1731. S4x14 Session: You Name It; We Analyze It
  1732. California man who lasered two helicopters to face 14 years behind bars
  1733. Hack of Boxee.tv exposes password data, messages for 158,000 users
  1734. Dumb hackers leave encryption keys on victims' PCs
  1735. Researcher Lights Fire Under Tesla Security
  1736. Hackers Use Security Camera DVRs As Bitcoin Mining Rig
  1737. SmartTV, dumb vuln: Philips hard-codes Miracast passwords The Register
  1738. 'Thingularity' Triggers Security Warnings
  1739. Ad tracking: Is anything being done?
  1740. Researchers Divulge 30 Oracle Java Cloud Service Bugs
  1741. How I got root with Sudo | Securus Global Blog
  1742. Redpoint: Discover & Enumerate BACnet Devices
  1743. Smarter People are More Trusting
  1744. Brian Krebs Subject of Sony Pictures Movie Deal | The State of Security
  1745. A few updates on "The Moon" worm, (Tue, Mar 25th)
  1746. Most ATMs will remain on Windows XP after Microsoft pulls plug on OS support
  1747. The Internet of Things is being used to mine digital currency
  1748. Hackers Can Force ATMs to Spit Out Money With a Text Message
  1749. Forget black hats the best hackers are going grey and getting legit The Register
  1750. About 55k In San Francisco Impacted In Theft Of Sutherland Computers
  1751. Metadata Poses Both Risks And Rewards
  1752. Microsoft Outlook Users Face Zero-Day Attack
  1753. Full Disclosure List Rises From the Ashes For Fresh Start
  1754. Beware this big iOS flaw -- and it's not alone | Security & Privacy - CNET News
  1755. Lenny Zeltser on Moats
  1756. Are Credit Monitoring Services Worth It?
  1757. Carnal0wnage & Attack Research Blog: Webmin Brute Forcing
  1758. WordPress XML-RPC PingBack Vulnerability Analysis - SpiderLabs Anterior
  1759. To Err Human, To Automate Secure | Radware Blog | Radware Blog
  1760. Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping | Ars Technica
  1761. The Cyber Security Skills Gap - J4vv4D
  1762. New iOS flaw makes devices susceptible to covert keylogging, researchers say | Ars Technica
  1763. RFID Wallets/Sleeves. How much Security do they provide? | Pentura Labs's Blog
  1764. ChrisTruncer/EyeWitness GitHub
  1765. Trey Ford: Testing, notification should not be criminalized (slides) | Page 6 | ZDNet
  1766. BsidesSF 2014 Fix What Matters
  1767. Hackers Can Infect Your Computer Even If It's Not Connected To The Internet
  1768. Target overhauls security and compliance group, CIO resigns
  1769. Hackers Take Control Of 300,00 Home Routers
  1770. CIA Found To Be Hacking The Senate Intelligence Committee
  1771. Hackers Churning Out 55,000 Malware Variants Every Day
  1772. Cisco Patches Authentication Flaw in Wireless Routers
  1773. Tenable Unveils Industrys First Integrated Threat and Vulnerability Management Capabilities for Faster Resolution of Critical Security Incidents
  1774. SC Magazine Interviews Tenables Jack Daniel
  1775. Tenable Adds Cloud Management and Multi-Scanner Support to Nessus
  1776. RSA News: Tenable Enhances Platform
  1777. A New Airborne WiFi Virus Spreads Like the Common Cold
  1778. "Researchers at the University of Liverpool claim to have created a computer virus that can spread via Wi-Fi as effic...
  1779. C programming: you are teaching it wrong
  1780. Windows XP Ends After 12 Years, Apple Snow Leopard After 4
  1781. Car Hacking: You Cannot Have Safety without Security
  1782. Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy
  1783. DDoS & Security Reports NTP ATTACKS: Welcome to The Hockey Stick Era
  1784. Swiss Firm Digs Up 300,000+ Usernames/Passwords on Pastebin | Threatpost | The first stop for security news
  1785. Time to Harden Your Hardware? Krebs on Security
  1786. Compliance Summary
  1787. Account Weakness
  1788. CVE Analysis
  1789. Event Vulnerabilities
  1790. Compliance Summary Report
  1791. PVS Detections Report - Traffic
  1792. CVE Monthly Status Report
  1793. Opera < 19.0 (for Mac) Address Bar URI Spoof Vulnerabilities
  1794. Palo Alto Device Detection
  1795. Apache Tomcat 6.0.x < 6.0.39 Multiple Vulnerabilities
  1796. Quicktime (for Windows) < 7.7.5 Multiple Vulnerabilities
  1797. Apple Quicktime 7.7.5 Multiple Vulnerabilities
  1798. Mac OS X < 10.9.2 Multiple Vulnerabilities
  1799. Mac OS X : Safari < 6.1.2 / 7.0.2 Multiple Vulnerabilitieses
  1800. Windows Phone Operating System Version Detection
  1801. Apple iOS 7.x < 7.0.6 / 6.x < 6.1.6 Data Security Vulnerability
  1802. PostgreSQL < 9.3.3 / 9.2.7 / 9.1.12 / 9.0.16 / 8.4.20 Multiple Vulnerabilities
  1803. Google Chrome for iOS < 33.0.1750.14 Unspecified Security Vulnerability
  1804. Microsoft Operating System Detection
  1805. MariaDB Client 5.5.x < 5.5.36 Remote Multiple Denial of Service Vulnerabilities
  1806. Google Chrome < 33.0.1750.117 Multiple Vulnerabilities
  1807. MariaDB Client 5.5.x < 5.5.35 Buffer Overflow Vulnerability
  1808. HNAP Protocol Detection
  1809. RuggedCom Rugged Operating System < 3.12.4 (or 4.0 for RSG2488) Remote Denial of Service via SNMP
  1810. IBM Domino < 9.0.1 Unspecified IMAP Remote Denial of Service Vulnerability
  1811. Apache Subversion < 1.6.21 / 1.7.9 Remote Denial of Service Vulnerability
  1812. Titan FTP Server < 10.40 Build 1829 Directory Traversal Vulnerability
  1813. PHP 5.5.x < 5.5.9 Multiple Vulnerabilities
  1814. Pale Moon Browser Version Detection
  1815. Pale Moon < 24.3.2 Unspecified Security Vulnerability
  1816. OS Detection
  1817. Microsoft Version Check
  1818. Apple Version Check
  1819. Unsupported Cisco Operating System
  1820. Ubiquiti airCam < 1.2.0 ubnt-streamer RTSP Service Remote Code Execution
  1821. MS KB2934802: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  1822. Serv-U FTP Server < 15.0.1.20 DoS
  1823. PostgreSQL 8.4 < 8.4.20 / 9.0 < 9.0.16 / 9.1 < 9.1.12 / 9.2 < 9.2.7 / 9.3 < 9.3.3 Multiple Vulnerabilities
  1824. Core FTP Server Detection
  1825. Core FTP Server < 1.2 Build 508 Multiple Buffer Overflow Vulnerabilities
  1826. Core FTP Server < 1.2 Build 515 Multiple Vulnerabilities
  1827. SFTP Supported
  1828. Anonymous SFTP Enabled
  1829. Nortel Meridian Integrated RAN Default Admin Credentials
  1830. Apple iOS 6.x < 6.1.6 'SSLVerifySignedServerKeyExchange' Certificate Validation Weakness
  1831. Apple iOS 7.x < 7.0.6 'SSLVerifySignedServerKeyExchange' Certificate Validation Weakness
  1832. Cisco Firewall Services Module Software Denial of Service (cisco-sa-20140219-fwsm)
  1833. Zimbra Collaboration Server Aspell Spell Check Service Detection
  1834. Zimbra Collaboration Server aspell.php dictionary Parameter XSS
  1835. CoSoSys Endpoint Protector < 4.4.0.1 Unspecified XSS
  1836. Artweaver 3.x < 3.1.6 AWD File Buffer Overflow
  1837. ASUS Routers flag Parameter XSS
  1838. Enumerate Local Users
  1839. Jenkins < 1.551 / 1.532.2 and Jenkins Enterprise 1.509.x / 1.532.x < 1.509.5.1 / 1.532.2.2 Multiple Vulnerabilities
  1840. MyBB < 1.6.11 Multiple Vulnerabilities
  1841. Mac OS X < 10.9.2 Multiple Vulnerabilities
  1842. Mac OS X Multiple Vulnerabilities (Security Update 2014-001)
  1843. Mac OS X : Safari < 6.1.2 / 7.0.2 Multiple Memory Corruption Vulnerabilities
  1844. Apache Tomcat 6.0.x < 6.0.39 Multiple Vulnerabilities
  1845. Apache Tomcat 7.0.x < 7.0.50 Multiple Vulnerabilities
  1846. Apache Tomcat 8.0.x < 8.0.3 Content-Type DoS
  1847. Apache Tomcat 7.0.x < 7.0.52 Content-Type DoS
  1848. StruxureWare SCADA Expert ClearSCADA Detection
  1849. StruxureWare SCADA Expert ClearSCADA Unspecified Vulnerability
  1850. CoDeSys 2.x Development System Detection (credentialed check)
  1851. Ubuntu 12.10 : linux vulnerabilities (USN-2114-1)
  1852. Ubiquiti airCam Detection
  1853. Microsoft .NET Framework Unsupported
  1854. Multiple Vulnerabilities in Cisco Intrusion Prevention System Software (cisco-sa-20140219-ips)
  1855. QuickTime < 7.7.5 Multiple Vulnerabilities (Windows)
  1856. Mitsubishi Electric Automation MC-WorX 8.x ActiveX Control Remote Code Execution
  1857. MariaDB 5.1 < 5.1.69 NAME_CONST Query DoS
  1858. MariaDB 5.2 < 5.2.15 NAME_CONST Query DoS
  1859. MariaDB 5.3 < 5.3.13 Multiple DoS Vulnerabilities
  1860. MariaDB 5.5 < 5.5.36 Multiple DoS Vulnerabilities
  1861. MariaDB 10 < 10.0.9 Multiple DoS Vulnerabilities
  1862. phpMyAdmin 3.x >= 3.3.1 / 4.x < 4.1.7 import.php XSS
  1863. ImageMagick < 6.8.7-6 WritePSDImage PSD Handling Memory Corruption
  1864. ImageMagick < 6.8.8-5 Multiple PSD Handling Buffer Overflows
  1865. Unified SIP Phone 3905 Unauthorized Access
  1866. Cisco 9900 Series IP Phone Crafted Header Unregister Vulnerability
  1867. Blue Coat ProxySG Local User Modification Race Condition
  1868. Cisco Jabber for Windows Detection
  1869. Cisco Jabber for Windows 9.x < 9.2(2) 'Send Screen Capture' File Write
  1870. McAfee ePolicy Orchestrator < 4.6.7 HF 940148 XML Entity Injection
  1871. McAfee ePolicy Orchestrator Unsupported Version Detection
  1872. Foxit Reader < 6.1.4 imgseg.dll Path Subversion Arbitrary DLL Injection Code Execution
  1873. DameWare Remote Support Detection
  1874. DameWare Remote Support < 9 Hotfix 2 / 10 Hotfix 2 DWExporter.exe Buffer Overflow
  1875. Jenkins < 1.545 Subversion Plugin Information Disclosure
  1876. Subversion 1.3.x - 1.7.14 / 1.8.x < 1.8.8 mod_dav_svn DoS
  1877. Grails resources plug-in WEB-INF / META-INF File Disclosure
  1878. Zabbix < 1.8.20 / 2.0.11 / 2.2.2 Multiple Vulnerabilities
  1879. Over 2,560 Internal Security Breaches Occurred In US Businesses Every Day
  1880. Another Day a New Router Vulnerability Discovered
  1881. Common Linux Misconfigurations - InfoSec Institute
  1882. WRT120N fprintf Stack Overflow
  1883. Apple TV Hacking, Counterattacks, and Certificate Pinning Intrepidus Group - Insight
  1884. Technical Details Behind a 400Gbps NTP Amplification DDoS Attack | CloudFlare Blog
  1885. The Keystone Rocks - Foundation Chips of Pentesting Tips Part 1 - SpiderLabs Anterior
  1886. Hackers circulate thousands of FTP credentials, New York Times among those hit
  1887. Dear Asus router user: You've been pwned
  1888. Webcams exposed in Google Drive clickjack attack
  1889. Malware-flinging Linksys vulnerability confirmed as a HNAP1 bug
  1890. Belkin patches WeMo bug
  1891. 5 Tactics To Help Triage Patching
  1892. Belkin Wemo Smart Home Networks In Danger Of Hacks
  1893. Hackers Are Switching To Chargeware Scams
  1894. Two-Factor Authentication Vulnerability Identified in WordPress Plugins
  1895. Email Attack on Vendor Set Up Breach at Target
  1896. Egor Homakov: How I hacked Github again.
  1897. Cheat Sheets - OWASP
  1898. Cheat Sheets - Packet Life
  1899. Re-enabling JTAG and Debugging the WRT120N
  1900. Cracking Linksys Encryption
  1901. Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem
  1902. Please Dont Lock this Door Tonight
  1903. The Failure of the PCI-DSS?
  1904. HTTP NTLM Information Disclosure
  1905. NTP Reflection Attacks
  1906. Linksys Worm ("TheMoon") Captured, (Thu, Feb 13th)
  1907. HVAC Integrators Billing Connection Led to Target Breach
  1908. Detecting Car Hacks
  1909. BBC News - Huge hack 'ugly sign of future' for internet threats
  1910. How I hacked Instagram to see your private photos - insertCoin
  1911. A Snapchat Hack Is Sending People Pictures of Smoothies
  1912. Edward Snowden Got a Bunch of NSA Info By Stealing a Coworker's Password
  1913. Suspected Mass Exploit Against Linksys E1000 / E1200 Routers - Internet Security | SANS ISC
  1914. Have a Linksys router? Now's a good time to update that firmware
  1915. Hacked X-Rays Could Slip Guns Past Airport Security
  1916. Meet The Man Who Hacked Jeopardy
  1917. Snowden's tools for hacking NSA not exactly high tech
  1918. 'No, I CAN'T write code myself,' admits woman in charge of teaching our kids to code
  1919. Evan Schuman: Get ready, IT; here comes the Internet of Things
  1920. John McAfee declares war on Android
  1921. Patch Tuesday brings Microsoft fixes and Adobe Shockwave update
  1922. FlashCanvas <= 1.5 Reflected Cross-site Scripting Attack
  1923. PVS Detections
  1924. Shockwave Player <= 12.0.7.148 Multiple Memory Corruption Vulnerabilities (APSB14-06)
  1925. MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (2928390)
  1926. MS14-010: Cumulative Security Update for Internet Explorer (2909921)
  1927. MS14-009: Vulnerabilities in .NET Framework Could Allow Privilege Escalation (2916607)
  1928. MS14-008: Vulnerability in Microsoft Forefront Protection for Exchange Could Allow Remote Code Execution (2927022)
  1929. MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution (2912390)
  1930. MS14-006: Vulnerability in ICMPv6 Could Allow Denial of Service (2904659)
  1931. MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2916036)
  1932. Web Site Client Access Policy File Detection
  1933. Using Security Center to find Default & Common Credential
  1934. Mobile Devices Perceived as Security Industry's Weakest Link, Finds '2014 Cyberthreat Defense Report'
  1935. Relative Date Summary Report
  1936. Do you have HVAC systems on your internal network?
  1937. Mozilla Firefox < 27.0 / 24.3 (ESR version) Multiple Vulnerabilities
  1938. Mozilla Firefox for Android < 27.0 Multiple Vulnerabilities
  1939. Mozilla SeaMonkey < 2.24 Multiple Vulnerabilities
  1940. Mozilla Thunderbird < 24.3 Multiple Vulnerabilities
  1941. Google Chrome < 32.0.1700.102 Multiple Vulnerabilities
  1942. OID parsing
  1943. Adobe AIR <= 3.9.0.1380 Multiple Vulnerabilities (APSB14-02)
  1944. Flash Player (Internet Explorer) <= 11.9.900.170 Multiple Vulnerabilities (APSB14-02)
  1945. Flash Player < 12.0.0.43 Multiple Vulnerabilities (APSB14-02)
  1946. Flash Player <= 11.7.700.260 / 12.0.0.43 (inferred) Remote Code Execution (APSB14-04)
  1947. Flash Player <= 11.7.700.260 / 12.0.0.43 Multiple Vulnerabilities (APSB14-04)
  1948. Google Chrome < 32.0.1700.107 Remote Code Execution
  1949. CVE Trending by Year
  1950. Emerson Network Power Avocent MergePoint Unity 2016 < 1.14 / 1.18 download.php filename Parameter Directory Traversal
  1951. Sophos Anti-Virus Engine < 3.50.1 System Objects DoS
  1952. Cisco Secure ACS Portal Interface Session Hijacking
  1953. Oracle Secure Global Desktop Multiple Vulnerabilities
  1954. Oracle Secure Global Desktop Unsupported Release
  1955. Synology DiskStation Manager (DSM) Detection
  1956. Synology DiskStation Manager 4.0-x < 4.0-2259 / 4.1-x / 4.2-x < 4.2-3243 SLICEUPLOAD Function Remote Code Execution
  1957. Synology DiskStation Manager < 4.3-3776 Update 2 Multiple Vulnerabilities
  1958. Synology DiskStation Manager < 4.3-3776 Update 3 info.cgi Multiple Parameters XSS
  1959. Synology DiskStation Manager 4.3-x < 4.3-3810 Update 1 Multiple Vulnerabilities
  1960. Synology DiskStation Manager < 4.3-3810 Update 3 Multiple FileBrowser Component Directory Traversal Vulnerabilities
  1961. Synology DiskStation Manager uistrings.cgi lang Parameter Directory Traversal
  1962. Novell Client 2 Vba32 AntiRootKit DoS
  1963. McAfee VirusScan Enterprise 8.8 < 8.8 Patch 1 DoS
  1964. Microsoft Internet Explorer Version Detection
  1965. IBM SPSS SamplePower 3.0.1 < 3.0.1 IF1 ActiveX Control Remote Code Execution
  1966. Oracle Identity Manager October 2013 CPU
  1967. Artweaver Detection
  1968. Artweaver 3.x < 3.1.5 JPG File Handling Stack-based Buffer Overflow
  1969. WinSCP < 5.1.6 RSA Signature Blob Integer Overflow
  1970. Red Hat JBoss Enterprise Application Platform 6.1.0 Security Update (RHSA-2013-1843)
  1971. Dell KACE K1000 Web Detection
  1972. Dell KACE K1000 < 5.5 Multiple SQL Injection Vulnerabilities
  1973. IrfanView MrSID Plugin < 4.37 Multiple Buffer Overflows
  1974. Adobe Digital Editions 2.0.0 'rmsdk_wrapper.dll' Memory Corruption (APSB13-20)
  1975. Adobe Digital Editions 2.0.1 Memory Corruption (Mac OS X)
  1976. HP B-series SAN Network Advisor Installed (Linux)
  1977. Dell KACE K2000 < 3.3.52857 Multiple Vulnerabilities
  1978. WinSCP < 5.1.7 Multiple Vulnerabilities
  1979. MediaWiki < 1.19.10 / 1.21.4 / 1.22.1 Multiple Vulnerabilities
  1980. Microsoft hoping users will get friends, family to leave Windows XP - Los Angeles Times
  1981. Using your Mobile to protect you from criminals
  1982. 10 of the Biggest Trends in Technology For 2014
  1983. Trojan.Win32.FSYSNA.fej AKA Chewbacca
  1984. Passive Vulnerability Scanner (PVS) 4.0.1 Now Available
  1985. Leveraging Logins and Login Failures to Track Insiders
  1986. Event Vulnerability Indicators
  1987. Vulnerability Top Ten
  1988. Xbox Gaming Console Detection
  1989. iTunes for Windows < 11.1.4 Multiple Vulnerabilities
  1990. iTunes (for OS X) < 11.1.4 Tutorials Content Injection
  1991. CUPS < 1.7.1 Local Privilege Escalation Vulnerability
  1992. Google Chrome for Android < 32.0.1700.99 Multiple Unspecified Vulnerabilities
  1993. SC Magazine Reviews SecurityCenter Continuous View
  1994. A fine mess: Global data breach legislation
  1995. Vulnerability Top Ten Executive Report
  1996. Nessus Scan Report
  1997. Insider Threat Report
  1998. Cisco Secure ACS RMI Arbitrary File Read (CSCud75169)
  1999. Cisco Secure ACS Portal Cross-Site Scripting (CSCue65949)
  2000. Puppet Symlink File Overwrite
  2001. Landing Pages Plugin for WordPress wp-admin/edit.php post Parameter SQL Injection
  2002. Cisco TelePresence Video Communication Server SIP DoS
  2003. StruxureWare SCADA Expert ClearSCADA < 2013 R2 Remote DoS
  2004. JBoss Detection
  2005. IBM Tivoli Storage Manager Client 6.3.1.x < 6.3.2.0 / 6.4.x < 6.4.1.0 ReFS Insecure File Permissions
  2006. McAfee VirusScan Enterprise < 8.8 / 8.7 HF643440 CLI Local Privilege Escalation
  2007. SAP GUI DLL Loading Arbitrary Code Execution (Note 1511179)
  2008. memcached < 1.4.17 Multiple Vulnerabilities
  2009. Oracle Access Manager Installed (credentialed check)
  2010. Oracle Access Manager October 2013 Critical Patch Update
  2011. MediaWiki < 1.19.11 / 1.21.5 / 1.22.2 Multiple Remote Code Execution Vulnerabilities
  2012. McAfee VirusScan Enterprise 8.5 / 8.7 hcp:// Security Bypass
  2013. memcached SASL Authentication Security Bypass
  2014. Symantec Workspace Virtualization Agent Detection
  2015. Symantec Workspace Virtualization 6.x < 6.4.1953 Local Privilege Escalation (SYM13-011)
  2016. IBM Global Security Kit 7 < 7.0.4.48 / 8 < 8.0.50.16 DoS
  2017. Pidgin < 2.10.8 Multiple Vulnerabilities
  2018. IBM Global Security Kit 7 < 7.0.4.47 / 8 < 8.0.50.13 DoS
  2019. Flash Player for Mac <= 11.7.700.260 / 12.0.0.43 Unspecified Remote Code Execution (APSB14-04)
  2020. MS KB2929825: Update for Vulnerability in Adobe Flash Player in Internet Explorer
  2021. Amazon Linux AMI : openssl Remote Crash Vulnerability (ALAS-2014-273)
  2022. Amazon Linux AMI : nss Man-in-the-middle Vulnerability (ALAS-2014-274)
  2023. Amazon Linux AMI : varnish Multiple Vulnerabilities (ALAS-2014-276)
  2024. Amazon Linux AMI : xorg-x11-server Buffer Overflow Vulnerability (ALAS-2014-277)
  2025. Amazon Linux AMI : gnupg Side-channel Attack Vulnerability (ALAS-2014-278)
  2026. Amazon Linux AMI : quagga Denial of Service (ALAS-2014-279)
  2027. Amazon Linux AMI : ca-certificates Man-in-the-middle Vulnerability (ALAS-2014-281)
  2028. Amazon Linux AMI : libXfont Buffer Overflow Vulnerability (ALAS-2014-282)
  2029. Amazon Linux AMI : augeas Privilege Vulnerability (ALAS-2014-286)
  2030. Amazon Linux AMI : puppet Filesystem Vulnerability (ALAS-2014-288)
  2031. Firefox ESR 24.x < 24.3 Multiple Vulnerabilities (Mac OS X)
  2032. Firefox < 27.0 Multiple Vulnerabilities (Mac OS X)
  2033. Thunderbird < 24.3 Multiple Vulnerabilities (Mac OS X)
  2034. Firefox ESR 24.x < 24.3 Multiple Vulnerabilities
  2035. Firefox < 27.0 Multiple Vulnerabilities
  2036. Mozilla Thunderbird < 24.3 Multiple Vulnerabilities
  2037. SeaMonkey < 2.24 Multiple Vulnerabilities
  2038. MongoDB < 2.3.2 BSON Object Length Handling Memory Disclosure
  2039. How I Lost My $50,000 Twitter Username Medium
  2040. A chain is only as strong as its weakest link DNS Hijack Monitoring | Corelan Team
  2041. Reversing the WRT120Ns Firmware Obfuscation - /dev/ttyS0
  2042. RFKiller/mass-deauth GitHub
  2043. DanMcInerney/wifijammer GitHub
  2044. SecUpwN/Android-IMSI-Catcher-Detector GitHub
  2045. Target Hackers Broke in Via HVAC Company
  2046. Installing Nessus on Kali Linux and Doing a Credentialed Scan
  2047. JavaScript: the one true language
  2048. Exploring the Telephony Denial of Service (TDoS)
  2049. Dancho Danchev's Blog - Mind Streams of Information Security Knowledge: A Peek Inside a Customer-ized API-enabled DIY Online Lab for Generating Multi-OS Mobile Malware
  2050. Mobile Malware Captures Keystrokes and Screengrabs | Threatpost - English - Global - threatpost.com
  2051. Nest Team Will Become Google's Core Hardware Group
  2052. Only Your Heartbeat Can Unlock This Bitcoin Wallet
  2053. Wikipedia Remote Execution Vulnerability Patched | Threatpost - English - Global - threatpost.com
  2054. Details Emerge on Latest Adobe Flash Zero-Day Exploit
  2055. Rare Twitter username stolen | In2EastAfrica East African news, Headlines, Business, Tourism, Sports, Health, Entertainment, Education
  2056. Target Hackers Used Stolen Vendor Credentials
  2057. Chewbacca Attack Hits Shops In 11 Nations
  2058. US Hotels Look Into Data Security Breach
  2059. The Government Wants Our Cars To Talk To Each Other
  2060. Windows XP Support Cut-Off Could Lead To Spam Boom
  2061. 800,000 Orange France Customers Face Cyberattack
  2062. Anyone Using POS Is At Risk
  2063. Target traces security breach to stolen vendor credentials
  2064. Toy Maker Hasbros Site Serving Drive-By Download Attacks
  2065. High-Volume DDoS Attacks Top Operational Threat to Businesses, Service Providers
  2066. Would NFC smartphones have helped at Target?
  2067. Remote code execution bug in Yahoo servers leads to root access
  2068. Use MediaWiki and hate malware? This patch is for you
  2069. Multi-platform Java bot marshals ZOMBIE FORCE against spammers
  2070. Red or Blue, I'm Usually The Only Woman On The Team -- Dark Reading
  2071. VMware vCloud Director Logout CSRF (VMSA-2014-0001)
  2072. Informix Server Global Security Kit SSL/TLS DoS
  2073. No sixth sense: '123456' is worst password of 2013 | Crave - CNET
  2074. Snapchat's new verification already hacked | Security & Privacy - CNET News
  2075. Linksys & Netgear Backdoor by the Numbers | Skizzle Sec
  2076. Metasploit: Making Your Printer Say "Feed Me a ... | SecurityStreet
  2077. How I bypassed 3rd-degree profiles in LinkedIn
  2078. SI6 Networks
  2079. Apple punts patches for holes in Pages and OS X, Windows iTunes
  2080. Michaels Data Breach Under Investigation
  2081. Punish careless employees to reduce security breaches, vendor says
  2082. Authentication bypass bug exposes Foscam webcams to unauthorized access
  2083. IBM Domino 8.5.x < 8.5.3 FP6 iNotes Multiple XSS (uncredentialed check)
  2084. IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (uncredentialed check)
  2085. IBM Domino 8.5.x < 8.5.3 FP6 iNotes Multiple XSS (credentialed check)
  2086. IBM Domino 9.x < 9.0.1 Multiple Vulnerabilities (credentialed check)
  2087. MySQL debian.cnf Plaintext Credential Disclosure
  2088. Serv-U FTP Server < 15.0.0.0 Multiple Security Vulnerabilities
  2089. XnView 2.x < 2.13 Multiple Buffer Overflows
  2090. Oracle Java SE Multiple Vulnerabilities (January 2014 CPU)
  2091. Oracle Java SE Multiple Vulnerabilities (January 2014 CPU) (Unix)
  2092. Google Chrome < 32.0.1700.76 Multiple Vulnerabilities
  2093. Google Chrome < 32.0.1700.77 Multiple Vulnerabilities (Mac OS X)
  2094. Oracle Database January 2014 Critical Patch Update
  2095. MySQL 5.1.x < 5.1.72 Multiple Vulnerabilities
  2096. MySQL 5.1.x < 5.1.73 Multiple Vulnerabilities
  2097. MySQL 5.5 < 5.5.34 Multiple Vulnerabilities
  2098. MySQL 5.5.x < 5.5.35 Multiple Vulnerabilities
  2099. MySQL 5.6.x < 5.6.14 Multiple Vulnerabilities
  2100. MySQL 5.6.x < 5.6.15 Multiple Vulnerabilities
  2101. CUPS 1.6.x >= 1.6.4 / 1.7.x < 1.7.1 lppasswd Information Disclosure
  2102. BlackBerry < 10.1.0.1880 Multiple Flash Player Code Execution Vulnerabilities
  2103. Symantec Endpoint Protection Client < 11.0.7.4 / 12.1.2 (SYM14-001)
  2104. Symantec Endpoint Protection Manager < 11.0.7.4 / 12.1.2 RU2 (SYM14-001)
  2105. ColdFusion Extended Support Version Detection
  2106. ColdFusion Unsupported Version Detection
  2107. ColdFusion Extended Support Version Detection (credentialed check)
  2108. ColdFusion Unsupported Version Detection (credentialed check)
  2109. MapServer < 5.6.9 / 6.0.4 / 6.2.2 / 6.4.1 SQL Injection
  2110. Drupal 6.x < 6.30 OpenID Module Account Hijacking
  2111. Drupal 7.x < 7.26 Multiple Vulnerabilities
  2112. DTLS Client Detection
  2113. Sony PlayStation 4 Detection
  2114. MySQL 5.5.x < 5.5.35 Remote Code Execution
  2115. MySQL 5.1.x < 5.1.73 Remote Code Execution
  2116. Sonos Device Detection
  2117. SmartTV Device Detection
  2118. Plex Application Detection
  2119. Sonatype Nexus < 2.7.1 'XStream' Object Remote Code Execution Vulnerability
  2120. SANS 6 Categories of Critical Log Information
  2121. CIP-002 Identification of Critical Cyber Assets Report
  2122. Malware Detection
  2123. Target breach shows payment system security needs less talk, more action
  2124. FireEye Finds Six Android Malware Variants Stealing Data
  2125. Bluetooth Hackers Allegedly Skimmed Millions Via Gas Stations
  2126. Read this before you buy another hard drive | HITBSecNews
  2127. How a Math Genius Hacked OkCupid to Find True Love - Wired Science
  2128. Chrome Browser Becomes Eavesdropping Tool
  2129. Critical Infrastructure Protection Bill Passed in Committee
  2130. SANS 6 Categories of Critical Log Information
  2131. Encryption On The Wire
  2132. The Changing Face Of The IT Security Team
  2133. MySQL 5.x < 5.6.13 Multiple Vulnerabilities
  2134. Mac OS X : Safari < 6.1.1 / 7.0.1 Multiple Vulnerabilitieses
  2135. Google Chrome < 32.0.1700.76 Multiple Vulnerabilities
  2136. Xbox Gaming Console Detection
  2137. KiSS PC-Link Client Detection
  2138. Daily Host Alerts Report: Hosts Accessed by Users
  2139. Critical and Exploitable Vulnerabilities Report
  2140. Daily Host Alerts Report: Users Accessing Hosts
  2141. Errors and Warnings Report
  2142. VMware Workstation 9.x < 9.0.1 VMX Process DoS (VMSA-2014-0001) (Linux)
  2143. Oracle Identity Management Detection
  2144. Oracle Internet Directory LDAP Server Unspecified Remote Information Disclosure
  2145. Detecting The Trojan.POSRAM Malware
  2146. Nessus Compliance Checks for FortiGate Devices
  2147. The S4 SCADA Security Conference
  2148. Nessus 5.2.5 Is Available for Download
  2149. Hacking Risk Grows for Outdated ATMs
  2150. Apples Very Different BYOD Philosophy
  2151. A Walk Through the ICS Village
  2152. HealthCare.gov security -- 'a breach waiting to happen' | Security & Privacy - CNET News
  2153. Microsoft will furnish malware assassin to XP users until mid-2015
  2154. Hacker Turns Mouse Into A Webcam
  2155. Introduction to Anti-Fuzzing: A Defence in Depth Aid | NCC Group
  2156. The Internet of Things Is Wildly Insecure And Often Unpatchable | Wired Opinion | Wired.com
  2157. WordPress Plugins Exploitation Through the Big Data Prism - The Akamai Blog
  2158. A First Look at the Target Intrusion, Malware
  2159. 2013 Toolsmith Tool of the Year: Recon-ng
  2160. The Hidden Backdoors to the City of Cron | Sucuri Blog
  2161. Businesses are building shopper profiles based on sniffing phones WiFi
  2162. Apple Settles with FTC, Will Refund at Least $32.5 Million in App Store Purchases
  2163. Cisco Discloses Existence of Undocumented Backdoor in Routers
  2164. Critics Cut Deep on Yahoo Mail Encryption Rollout
  2165. Drug overdose caused death of hacker | Security & Privacy - CNET News
  2166. Yahoo enables default HTTPS encryption for Yahoo Mail
  2167. Skipfish Scanner Used in Financial Sector Attacks | The State of Security
  2168. avast! blog Mobile malware a real threat in 2014
  2169. At CES, Belkin bets big on WeMo | CES 2014: Appliances - CNET Blogs
  2170. Snapchat Hack Affects 4.6 Million Users
  2171. Anatomy Of A 22-Year-Old X Window Bug: Get Root With Uncovered Flaw
  2172. OpenSUSE forums hacked in ANOTHER vBulletin attack
  2173. Mikko Hypponen Still Speaking at the RSA Conference
  2174. Researchers publish Snapchat code allowing phone number matching after exploit disclosures ignored | ZDNet
  2175. gizmodo/full (Gizmodo) Surprise! It's Super Easy to Identify People From Metadata
  2176. Trojan program hijacks World of Warcraft accounts despite two-factor authentication
  2177. Flash Memory Cards Contain Powerful, Unsecured Microcontrollers
  2178. Probes Against Linksys Backdoor Port Surging
  2179. OpenSSL Hackers Used Weak Password at Web Host to Deface Site
  2180. Noted speaker, Mikko Hypponen, cancels RSA talk in protest to NSA collaboration allegations
  2181. Growing human organs inside pigs in Japan
  2182. Researcher Uncovers Backdoor In DSL Routers
  2183. FireEye buys outfit that lifted the lid on Chinese cyber-espionage
  2184. Hacker backdoors Linksys, Netgear, Cisco and other routers
  2185. ATM hacker Barnaby Jack's death blamed on accidental drug overdose The Register
  2186. NERC (CIP-002) Identification of Critical Cyber Assets
  2187. Port 22 Non-SSH Traffic Detection
  2188. Port 21 Non-FTP Traffic Detection
  2189. Samba < 3.6.22 / 4.0.13 / 4.1.3 Multiple Vulnerabilities
  2190. Port 443 Non-SSL Traffic Detection
  2191. Nessus HTML5 UI 2.1 Provides Enhanced Usability
  2192. Monthly Executive Report
  2193. Exploitable by Malware
  2194. Unsupported OS Report
  2195. Daily Host Alerts Report
  2196. Space Rogue from L0pht and Hacker News Network Joins Tenable Network Security
  2197. Ask A VC: Accels Ping Li On The Impact Of Data-Driven Software and More
  2198. Does retail security take a backseat during the 'holiday IT lockdown'?
  2199. Industry Predictions for 2014; Part 4: Managed Security Services
  2200. Industry Predictions for 2014; Part 3: The Effect and Influence of Government
  2201. Defending against self-destructing PCs, other mythical security threats Read more: Defending against self-destructing PCs, other mythical security threats
  2202. DB2 9.7 < Fix Pack 9 Multiple Vulnerabilities
  2203. Wireshark 1.8.x < 1.8.12 Multiple DoS
  2204. Wireshark 1.10.x < 1.10.4 Multiple DoS
  2205. LiveZilla < 5.1.2.1 Multiple Vulnerabilities
  2206. Novell iPrint Client < 5.93 DoS
  2207. OpenMediaVault Web Detection
  2208. OpenMediaVault Default Administrator Credentials
  2209. SuperMicro Device Uses Default SSH Host Key
  2210. SuperMicro Device Uses Default SSL Certificate
  2211. Zabbix 1.9.x < 1.9.4 zabbix_agentd DoS
  2212. Quagga 0.99.21 bgp_attr.c BGP Update DoS
  2213. Oracle Fusion Middleware Web Services Component Remote Information Disclosure
  2214. Asterisk Multiple Vulnerabilities (AST-2013-006 / AST-2013-007)
  2215. Subversion 1.6.x / 1.7.x / 1.8.x < 1.6.23 / 1.7.11 / 1.8.1 Multiple Vulnerabilities
  2216. Subversion 1.8.x < 1.8.2 FSFS Repository Corruption
  2217. Subversion 1.4.x - 1.7.12 / 1.8.x < 1.8.3 Multiple Symlink File Overwrite Vulnerabilities
  2218. Subversion 1.4.x - 1.7.13 / 1.8.x < 1.8.5 Multiple DoS
  2219. Apple Motion Installed (Mac OS X)
  2220. Apple Motion < 5.1 OZDocument::parseElement() Function MOTN File Subview Attribute Handling Integer Overflow
  2221. Winamp Unsupported
  2222. Safari Unsupported
  2223. VMSA-2013-0016 : VMware ESXi and ESX unauthorized file access through vCenter Server and ESX
  2224. NTP monlist Command Enabled
  2225. Splunk Enterprise 6.x < 6.0.1 Malformed Packet DoS
  2226. Winamp < 5.666 Multiple Memory Corruptions
  2227. HP Data Protector Multiple Vulnerabilities
  2228. ScMM DSL Modem/Router Backdoor Detection
  2229. Cisco WAAS Mobile Server Detection
  2230. Cisco WAAS Mobile Server Web Administration Interface Detection
  2231. Cisco WAAS Mobile Server Web Administration Default Credentials
  2232. Cisco WAAS Mobile Server < 3.5.5 Remote Code Execution
  2233. Lessons for CSOs in Snowden exploit of NSA networks
  2234. SSL SMTP Client Detection
  2235. Mozilla Thunderbird < 24.2 Multiple Vulnerabilities
  2236. Mozilla SeaMonkey 24.2 Multiple Vulnerabilities
  2237. Mozilla Firefox < 26.0 / 24.2 (ESR version) Multiple Vulnerabilities
  2238. Magnet Link Detection
  2239. Exploitable by Malware
  2240. iLO 3 < 1.65 / iLO 4 < 1.32 Multiple Vulnerabilities
  2241. CCC, 100-gbps, and your own private Shodan
  2242. How we know the 60 Minutes NSA interview was crap
  2243. DinoSec Blog
  2244. THC-Hydra 7.5 Released - Fast Parallel Network Logon Cracker - Darknet - The Darkside
  2245. All of Androids top 100 apps have been hacked and banking apps are now a prime target, report finds
  2246. How hackers made minced meat of Department of Energy networks
  2247. Security prediction for 2014: It will get worse
  2248. Edward Snowden Pens An Open Letter To The People Of Brazil
  2249. Android Nasty Sends Your Texts To China
  2250. Important Security Update for D-Link Routers Krebs on Security
  2251. GCC Poison | Leaf Security Research
  2252. Using a Hosts File To Make The Internet Not Suck (as much)
  2253. Mobile Device Tips, Tricks and Resources
  2254. Nvidia exploit could turn render farms into password crackers, bitcoin miners, researchers claim
  2255. The top 8 security threats of 2013
  2256. Guilty Verdict in First Ever Cybercrime RICO Trial | Threat Level | Wired.com
  2257. BBC News - Bots now 'account for 61% of web traffic'
  2258. Errata Security: Literally the nicest thing Ive ever done
  2259. How to find out if your password has been stolen | ZDNet
  2260. Network Security Tip of the Week
  2261. Installing PVS, the Passive Vulnerability Scanner
  2262. Flash Player for Mac <= 11.7.700.252 / 11.9.900.152 Multiple Vulnerabilities (APSB13-28)
  2263. Adobe AIR for Mac <= 3.9.0.1210 Multiple Vulnerabilities (APSB13-28)
  2264. Flash Player <= 11.7.700.252 / 11.9.900.152 Multiple Vulnerabilities (APSB13-28)
  2265. Adobe AIR <= AIR 3.9.0.1210 Multiple Vulnerabilities (APSB13-28)
  2266. SeaMonkey < 2.23 Multiple Vulnerabilities
  2267. Mozilla Thunderbird < 24.2 Multiple Vulnerabilities
  2268. Firefox < 26.0 Multiple Vulnerabilities
  2269. Firefox ESR 24.x < 24.2 Multiple Vulnerabilities
  2270. Thunderbird < 24.2 Multiple Vulnerabilities (Mac OS X)
  2271. Firefox < 26.0 Multiple Vulnerabilities (Mac OS X)
  2272. Firefox ESR 24.x < 24.2 Multiple Vulnerabilities (Mac OS X)
  2273. Shockwave Player <= 12.0.6.147 Memory Corruptions (APSB13-29)
  2274. VMware Player 5.x < 5.0.3 LGTOSYNC.SYS Guest Privilege Escalation (VMSA-2013-0014)
  2275. VMware Fusion 5.x < 5.0.4 LGTOSYNC.SYS Privilege Escalation (VMSA-2013-0014)
  2276. IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.1 Multiple Vulnerabilities
  2277. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities (Mac OS X)
  2278. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities
  2279. ManageEngine Desktop Central Default Administrator Credentials
  2280. ManageEngine Desktop Central AgentLogUploadServlet Arbitrary File Upload
  2281. ManageEngine Desktop Central AgentLogUploadServlet Arbitrary File Upload (intrusive check)
  2282. ManageEngine Desktop Central Detection
  2283. Jenkins Accessible without Credentials
  2284. VMSA-2013-0014 : VMware Workstation, Fusion, ESXi and ESX patches address a guest privilege escalation
  2285. Atlassian Confluence < 4.3.7 Multiple Vulnerabilities
  2286. Monitorix Built-in HTTP Server Remote Command Execution
  2287. Amazon Silk Web Browser Detection
  2288. OpenSSL < 0.9.8x / < 1.0.0j / < 1.0.1c Remote Denial of Service Vulnerability
  2289. Bitcoin Client Detection (Stratum)
  2290. Bitcoin Client Detection (JSON/RPC)
  2291. Bitcoin Client Detection (Bitcoin Protocol)
  2292. UPNP Traffic Detection (Client)
  2293. Google Chrome < 31.0.1650.63 Multiple Vulnerabilities
  2294. Google Chrome < 31.0.1650.57 Multiple Remote Code Execution Vulnerabilities
  2295. Google Chrome < 31.0.1650.48 Multiple Vulnerabilities
  2296. Apple Deployed Software Version Detection
  2297. Apple iOS 7.x < 7.0.4 Purchases Authentication Bypass
  2298. Apple iOS 7.x < 7.0.3 Multiple Vulnerabilities
  2299. Apple iOS 7.x < 7.0.2 Multiple Vulnerabilities
  2300. Opera Web Browser Version Detection
  2301. Opera < 18.0 Multiple Unspecified Vulnerabilities
  2302. Innominate Security Technologies mGuard SCADA Security Device Detection
  2303. Advantech Embedded Controller Detection
  2304. Malware Indicators Report
  2305. Remediation Instructions Report by Host
  2306. Executive 7 Day Summary
  2307. Passive Bitcoin Detection Indicator
  2308. Fortinet Firewall Dashboard
  2309. Daily Host Alerts
  2310. MS SQL Server Audit
  2311. Unknown Process(es)
  2312. NIST 800-53 Pie Charts
  2313. Secure your Apache server from DDoS, Slowloris, and DNS Injection attacks
  2314. No security ever built into Obamacare site: Hacker
  2315. Pen tester scoops source code in bug hunt contest, has to argue for prize The Register
  2316. Malware jumps 'air gap' between non-networked devices | Security & Privacy - CNET News
  2317. Using The Human Perimeter To Detect Outside Attacks
  2318. SANS Technology Institute accredited for masters in security
  2319. Hacker-built drone can hunt, hijack other drones
  2320. Shadow IT is undermining your security
  2321. OSIRT WordPress OptimizePress hack (file upload vulnerability)
  2322. Bypassing Seagate ATA Security Lock
  2323. Security Advisory: Stem Innovation IZON Hard-coded Credentials (CVE-2013-6236) - security vulnerabilities database
  2324. Depth Security: Dahua DVR Authentication Bypass - CVE-2013-6117
  2325. Juniper JunOS crossite scripting
  2326. Vivotek IP cameras authentication bypass
  2327. HP Integrated Lights-Out security vulnerabilities - security vulnerabilities database
  2328. isowall: an isolating firewall
  2329. Muddying The Water On Security And Embedded Devices
  2330. Maslows Hierarchy Of Security Product Needs & Vendor Selection
  2331. Top Security Predictions for 2014
  2332. Whats my name? No, really, what is it?
  2333. GitHub resets user passwords following rash of account hijack attacks
  2334. Who's The Boss Over Your JBoss Servers? -- Dark Reading
  2335. Going Back to the Future in the Name of Better Security
  2336. vBulletin.com's password database hack gives forum admins the jitters
  2337. SCADA flaws put world leaders at risk of TERRIBLE TRAFFIC JAM
  2338. Linux backdoor squirts code into SSH to keep its badness buried The Register
  2339. Hacking of forum software firm vBulletin spawns host of zero-day attacks- The Inquirer
  2340. Netflixers Beware: Angler Exploit Kit Targets Silverlight Vulnerability
  2341. Troy Hunt: Adobe credentials and the serious insecurity of password hints
  2342. Tavis Ormandy: QNX
  2343. w00tsec: Unpacking Firmware Images from Cable Modems
  2344. Multiple Vulnerabilities in Cisco IOS XE Software for 1000 Series Aggregation Services Routers (cisco-sa-20131030-asr1000)
  2345. Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20131106-sip)
  2346. OpenSSH v6.2 / v6.3 Remote Memory Corruption Vulnerability
  2347. OpenSSH 6.2 / 6.3 Remote Memory Corruption Vulnerability
  2348. Copyright Indicator
  2349. ACG Maryland - 2013 Deal of the Year Finalist - Tenable Network Security & Accel Partners
  2350. Risky Business Podcast #304 -- Tech heavyweights target NSA
  2351. Why Ben Franklin would have excelled in cyber security
  2352. Tenable Network Security Named a Deloitte 2013 Technology Fast 500 Award Winner
  2353. MS SQL Server Audit Report
  2354. Oracle DB Audit Report
  2355. Copyright Report
  2356. Adobe ColdFusion Multiple Vulnerabilities (APSB13-27) (credentialed check)
  2357. SeaMonkey < 2.22.1 NSS and NSPR Multiple Vulnerabilities
  2358. Oracle JavaServer Faces Multiple Partial Directory Traversals
  2359. Its the little things that count | Andy ITGuy - Information Security Blog
  2360. Healthcare.gov will eventually be functional, but how secure?
  2361. Defenders Still Chasing Adequate Threat Intelligence Sharing
  2362. Research Into BIOS Attacks Underscores Their Danger
  2363. Barracuda Web Application Firewall Now In AWS Marketplace
  2364. Hackers Take Limo Service Firm for a Ride Krebs on Security
  2365. Attacking the Spanning-Tree Protocol
  2366. 4 reasons BadBIOS isn't real | Security - InfoWorld
  2367. Apple II DOS source code released
  2368. The TRUTH about mystery Trojan found in SPAAACE
  2369. Security researcher Cdric 'Sid' Blancher dead at 37
  2370. MS13-088: Cumulative Security Update for Internet Explorer (2888505)
  2371. MS13-089: Critical Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution (2876331)
  2372. MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986)
  2373. MS13-091: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2885093)
  2374. MS13-092: Vulnerability in Hyper-V Could Allow Elevation of Privilege (2893986)
  2375. MS13-093: Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure (2875783)
  2376. MS13-094: Vulnerability in Microsoft Outlook Could Allow Information Disclosure (2894514)
  2377. MS13-095: Vulnerability in Digital Signatures Could Allow Denial of Service (2868626)
  2378. MS KB2868725: Update for Disabling RC4
  2379. MS KB2862152: Vulnerability in DirectAccess Could Allow Security Feature Bypass
  2380. Flash Player <= 11.7.700.242 / 11.9.900.117 Memory Corruptions (APSB13-26)
  2381. MS KB2898108: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  2382. Adobe AIR <= 3.9.0.1030 Memory Corruptions (APSB13-26)
  2383. Flash Player for Mac <= 11.7.700.242 / 11.9.900.117 Memory Corruptions (APSB13-26)
  2384. Adobe AIR for Mac <= 3.9.0.1030 Memory Corruptions (APSB13-26)
  2385. Zabbix < 1.8.18 / 2.0.9 Multiple SQL Injection Vulnerabilities
  2386. Oracle DB Audit
  2387. Firefox ESR < 17.0.10 Multiple Vulnerabilities (Mac OS X)
  2388. Firefox ESR 24.x < 24.1 Multiple Vulnerabilities (Mac OS X)
  2389. Thunderbird ESR < 17.0.10 Multiple Vulnerabilities (Mac OS X)
  2390. Firefox ESR < 17.0.10 Multiple Vulnerabilities
  2391. Mozilla Thunderbird < 24.1 Multiple Vulnerabilities
  2392. ImageMagick < 6.7.8-8 gif.c Memory Corruption
  2393. Citrix XenDesktop Director Detection
  2394. Citrix XenDesktop BrokerAccessPolicyRule Policy Rule Remote Security Bypass
  2395. IBM Domino 8.5.x < 8.5.3 FP 5 Multiple Vulnerabilities
  2396. IBM Domino 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
  2397. IBM Notes 8.5.x < 8.5.3 FP5 Multiple Vulnerabilities
  2398. RSA Authentication Agent for Web for IIS Installed
  2399. RSA Authentication Agent for Web for IIS 7.1.x < 7.1.2 Filter Bypass
  2400. vBulletin upgrade.php Accessible
  2401. Oracle Database Patch Info (Unix / Linux) (credentialed check)
  2402. Oracle Database Patch Info (Windows) (credentialed check)
  2403. Reputation of Windows Executables: Known Process(es)
  2404. Reputation of Windows Executables: Unknown Process(es)
  2405. MS KB2896666: Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution
  2406. Zabbix Web Interface Default Administrator Credentials
  2407. Tenable Network Security Joins Amazon Web Services (AWS) Marketplace to Provide On-Demand AMI Vulnerability Scanning
  2408. Threatlist Trending
  2409. PVS Network Trending
  2410. Mac OS X : Safari < 6.1 Multiple Security Vulnerabilities
  2411. Google Chrome < 30.0.1599.101 Multiple Vulnerabilities
  2412. Remediation Instructions Report by Severity
  2413. Remediation Instructions Report by Vulnerability
  2414. The badBIOS Analysis Is Wrong. at RootWyrm's Corner
  2415. Researcher Finds Method to Insert Malicious Firmware Into Currency Validator | Threatpost | The First Stop For Security News
  2416. Meet badBIOS, the mysterious Mac and PC malware that jumps airgaps | Ars Technica
  2417. Healthcare.govs Coming Security Crackup
  2418. #badBIOS features explained
  2419. Tracking Risk
  2420. Apache mod_fcgid Module < 2.3.9 fcgid_header_bucket_read() Function Heap Buffer Overflow
  2421. Panda AdminSecure Communications Agent < 4.50.0.10 Directory Traversal
  2422. Puppet Enterprise < 3.1.0 Multiple Vulnerabilities
  2423. Novell ZENworks umaninv Information Disclosure
  2424. EMC NetWorker 8.x < 8.0.2.3 Management Console Information Disclosure
  2425. Apache PHP-CGI Remote Code Execution
  2426. Oracle Secure Global Desktop Linux Installation Detection
  2427. Oracle Secure Global Desktop Administration Console Detection
  2428. Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (credentialed check)
  2429. Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (remote check)
  2430. Mozilla Thunderbird < 24.1 / 17.0.10 (ESR) Multiple Vulnerabilities
  2431. Mozilla SeaMonkey < 2.22 Multiple Vulnerabilities
  2432. Mozilla Firefox < 25.0 / 24.1 (ESR version) / 17.0.10 (ESR version) Multiple Vulnerabilities
  2433. ISAKMP Server Detection
  2434. ISAKMP Client Detection
  2435. Encapsulating Security Payload (ESP) Session Setup
  2436. Executive Patch Mitigation Report
  2437. Be sure you are prepared for OS X 10.9 Mavericks | Security Spread
  2438. Scan Shows 65% of ReadyNAS Boxes on Web Vulnerable to Critical Bug
  2439. Seven essentials for VM management and security
  2440. Netgear Root Compromise Via Command Injection
  2441. Tenda Shuts Router Backdoor Found By D-Link Hole Prober
  2442. Your Kettle Could Be A Spambot!
  2443. Systems with Sensitive Data
  2444. Virus Trending
  2445. Executive Age Summary Report
  2446. Mac OS X < 10.9 Multiple Vulnerabilities
  2447. SEW Eurodrive SCADA server detection
  2448. Schneider Electric Accutech Manager RF Successful Authentication
  2449. Schneider Electric Accutech Manager RF Server Detection
  2450. Schneider Electric Accutech Manager RF Failed Authentication
  2451. Schneider Electric Accutech Manager RF Client Detection
  2452. Moore Industries Embedded SCADA server detection
  2453. Indusoft Web Studio Server Detection
  2454. Indusoft Web Studio Client Detection
  2455. Indusoft Remote Code Execution Flaw
  2456. SSL Cipher Block Chaining Cipher Suites Supported
  2457. Dropbear SSH Server < 2013.59 Multiple Vulnerabilities
  2458. Puppet Unauthenticated Remote Code Execution
  2459. Puppet Enterprise < 3.0.1 Multiple Vulnerabilities
  2460. Doctors disabled wireless in Dick Cheneys pacemaker to thwart hacking
  2461. Ten Physical Security Tips for Mobile Devices - Cyveillance Blog - The Cyber Intelligence Blog
  2462. Capturing The Flag, SQLi-Style -- Dark Reading
  2463. Researchers uncover holes that open power stations to hacking | Ars Technica
  2464. From China, With Love - /dev/ttyS0
  2465. Mobile Summary Report
  2466. ZenPhoto Cross Site Scripting and SQL Injection Vulnerabilities
  2467. Beck IPC Embedded SCADA server detection
  2468. Hirschmann Automation and Control Embedded SCADA server detection
  2469. OnCell Wireless SCADA server detection
  2470. Solar Log SCADA server detection
  2471. Stulz Air Conditioning SCADA server detection
  2472. Dropbear SSH Memory Corruption Denial of Service and User Enumeration Weakness
  2473. Apache 'mod_fcgid' Module Heap Buffer Overflow Vulnerability
  2474. RuggedCom Rugged Operating System Multiple Security Vulnerabilities
  2475. Tenable Network Security Expands EMEA Team
  2476. SAI Global Deploys Tenable Network Security to Combat Security Vulnerabilities and Compliance
  2477. SSH Server Vulnerabilities
  2478. Snort IDS Events
  2479. Palo Alto Firewall Dashboard
  2480. Age Summary Dashboard
  2481. RuggedCom Rugged Operating System < 3.12.2 Multiple Vulnerabilities
  2482. Adobe RoboHelp 10 Unspecified Memory Corruption (APSB13-024)
  2483. XEROX ColorQube Device Detection
  2484. XEROX WorkCentre Multiple Unspecified Vulnerabilities (XRX13-006)
  2485. XEROX ColorQube Multiple Unspecified Vulnerabilities (XRX13-006)
  2486. HP LaserJet Printers Multiple Vulnerabilities
  2487. IBM DB2 and DB2 Connect Detection (credentialed)
  2488. DB2 10.1 < Fix Pack 3 Multiple Vulnerabilities
  2489. DB2 10.1 < Fix Pack 3 Multiple Vulnerabilities (credentialed)
  2490. Cisco NX-OS Software BGP Denial of Service Vulnerability (CSCtn13055)
  2491. Mac OS X : Java for OS X 2013-005
  2492. Mac OS X : Java for Mac OS X 10.6 Update 17
  2493. Oracle Database October 2013 Critical Patch Update
  2494. MySQL 5.1 < 5.1.71 Server Optimizer Denial of Service
  2495. MySQL 5.5 < 5.5.33 Multiple Vulnerabilities
  2496. MySQL 5.6.x < 5.6.13 Multiple Vulnerabilities
  2497. VMSA-2013-0012 : VMware vSphere updates address multiple vulnerabilities
  2498. Siemens SCALANCE X-200 Authentication Bypass
  2499. Siemens SCALANCE X-200 Web Session Hijacking
  2500. Opera < 17 Multiple Vulnerabilities
  2501. Window Process Information
  2502. Window Process Unique Process Name
  2503. Window Process Module Information
  2504. MS13-080: Cumulative Security Update for Internet Explorer (2879017)
  2505. MS13-081: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2870008)
  2506. MS13-082: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890)
  2507. MS13-083: Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2864058)
  2508. MS13-084: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2885089)
  2509. MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080)
  2510. MS13-086: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)
  2511. MS13-087: Vulnerability in Silverlight Could Allow Information Disclosure (2890788)
  2512. MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2885080) (Mac OS X)
  2513. MS13-087: Vulnerability in Silverlight Could Allow Information Disclosure (2890788) (Mac OS X)
  2514. Adobe Acrobat 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)
  2515. Adobe Reader 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)
  2516. AD Zone Transfers as a user
  2517. FAA panel: Wi-Fi is safe on planes even during takeoff and landing
  2518. 5 Wi-Fi security myths you must abandon now
  2519. Symantec takes on one of largest botnets in history
  2520. Iran's cyberwarfare czar is allegedly assassinated
  2521. IAVM Executive Summary Report
  2522. Snapchat Mobile App Usage Detected
  2523. Google Safebrowsing Client Detection
  2524. Google Chrome < 30.0.1599.66 Multiple Vulnerabilities
  2525. Business RadioX's Results Matter Radio Features Atlanta Businesses and Organizations Serving the Local Community
  2526. SAI Global Deploys Tenable Network Security to Combat Security Vulnerabilities and Compliance
  2527. Tenable Network Security Names Attley Ng as Asia-Pacific Vice President
  2528. IAVM Executive Summary Dashboard
  2529. Google Chrome < 30.0.1599.66 Multiple Vulnerabilities
  2530. RES Workspace Manager Agent Detection
  2531. RES Workspace Manager Relay Server Detection
  2532. WellinTech KingView ActiveX Multiple Arbitrary File Overwrite Vulnerabilities
  2533. MediaWiki < 1.19.8 / 1.20.7 / 1.21.2 Multiple Vulnerabilities
  2534. DotNetNuke < 6.2.9 / 7.1.1 Multiple Vulnerabilities
  2535. FireEye Web MPS GUI Detection
  2536. Mac OS X 10.8 < 10.8.5 Supplemental Update
  2537. Blue Coat ProxySG Remote DoS
  2538. Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability (cisco-sa-20130925-rsvp)
  2539. Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability (cisco-sa-20130925-rsvp)
  2540. Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability (cisco-sa-20130925-cce)
  2541. Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service Vulnerability (cisco-sa-20130925-ipv6vfr)
  2542. Cisco IOS Software Network Address Translation Vulnerabilities (cisco-sa-20130925-nat)
  2543. Cisco IOS Software Queue Wedge Denial of Service Vulnerability (cisco-sa-20130925-wedge)
  2544. Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
  2545. Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability (cisco-sa-20130925-ike)
  2546. Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
  2547. Derbycon 3.0 Videos Tracks 1 & 2
  2548. Barclays Bank Branch Bugged In 1.3m Breach
  2549. Exploit Disclosure
  2550. Facebook Pushes Passwords One Step Closer to Death
  2551. Yahoo abandons T-shirt rewards for vulnerability information
  2552. iPhone Fingerprint Scanner Hacked; Should You Care? - Forbes
  2553. Students Find Ways To Hack School-Issued iPads Within A Week : All Tech Considered : NPR
  2554. 10 Ways to Keep Your WordPress Site Secure
  2555. Researchers Unite To #ScanAllTheThings
  2556. 5 Reasons Every Company Should Have A Honeypot
  2557. Thirteen-Year-Olds Hack Their Way Into Space
  2558. Shutdown could test IT security at federal agencies
  2559. Linux/Unix Software Summary
  2560. iTunes < 11.1 ActiveX Memory Corruption
  2561. MDM Discovered Dashboard
  2562. Mobile Device Vulnerability
  2563. Tenable Network Security Receives Highest Rating Possible in 2013 Gartner Marketscope Report
  2564. Hackers Everywhere: A Conversation With Security Thinker Ron Gula
  2565. Apple TV < 6.0 Multiple Vulnerabilities
  2566. Cisco Prime LAN Management Solution Cross-Frame Scripting
  2567. Mac OS X : Cisco AnyConnect Secure Mobility Client 3.0.x / 3.1.x Local Privilege Escalation
  2568. IBM Lotus Sametime Connect Client Password Disclosure
  2569. Cigar Sickness
  2570. Top 7 Alcoholic Drinks to Accompany Cigars
  2571. Tenable Network Security Executives Win Prestigious Ernst and Young Entrepreneur of the Year 2013 Maryland Award.
  2572. Security Spending On The Rise As Threats Proliferate
  2573. Look at risk before leaping into BYOD, report cautions
  2574. Experts praise Pentagon's march to security standards
  2575. Historic Patch Mitigation Status
  2576. Tracking Device Types by Network
  2577. Windows Remediation Report
  2578. Linux/Unix Remediation Report
  2579. Windows Software Summary
  2580. Asterisk SIP Channel Driver ACK with SDP Denial of Service (AST-2013-004)
  2581. Asterisk SIP Channel Driver Invalid SDP Denial of Service (AST-2013-005)
  2582. Oracle GlassFish Server <= 3.1.1 Multiple Denial-of-Service Vulnerabilities
  2583. Mac OS X 10.8 < 10.8.5 Multiple Vulnerabilities (Security Update 2013-004)
  2584. Opera < 15.0 Cross-site Scripting Vulnerability
  2585. Mozilla Thunderbird < 24.0 / ESR 17.0.9 Multiple Vulnerabilities
  2586. Mozilla Firefox < 24.0 Multiple Vulnerabilities
  2587. Mozilla SeaMonkey < 2.21 Multiple Vulnerabilities
  2588. Apple iOS < 7 Multiple Vulnerabilities
  2589. HTTP Cookie 'secure' Property Transport Mismatch
  2590. MS13-072: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537)
  2591. MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300))
  2592. MS13-074: Vulnerabilities in Microsoft Access Could Allow Remote Code Execution (2848637)
  2593. MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation of Privilege (2876315)
  2594. MS13-077: Vulnerability in Windows Service Control Manager Could Allow Elevation of Privilege (2872339)
  2595. MS13-078: Vulnerability in FrontPage Could Allow Information Disclosure (2825621)
  2596. MS13-079: Vulnerability in Active Directory Could Allow Denial of Service (2853587))
  2597. MS13-073: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300) (Mac OS X)
  2598. MS KB2880289: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  2599. Shockwave Player <= 12.0.3.133 Memory Corruption Vulnerabilities (APSB13-23)
  2600. Adobe Acrobat < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
  2601. Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)
  2602. Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22) (Mac OS X)
  2603. LeagueManager Plugin for WordPress wp-admin/admin.php league_id Parameter SQL Injection
  2604. Cisco Secure Access Control System (ACS) Multiple Vulnerabilities
  2605. Cisco Video Surveillance Manager Web Detection
  2606. Cisco Video Surveillance Manager Default Administrator Credentials
  2607. Cisco Video Surveillance Manager Multiple Vulnerabilities (cisco-sa-20130724-vsm)
  2608. AIX PowerHA Cluster Management Unspecified Remote Configuration Manipulation
  2609. VxWorks 5.5 through 6.9 Multiple Vulnerabilities
  2610. Adobe AIR <= 3.8.0.870 Memory Corruptions (APSB13-21)
  2611. Flash Player <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
  2612. Adobe AIR for Mac <= 3.8.0.910 Memory Corruptions (APSB13-21)
  2613. Flash Player for Mac <= 11.7.700.232 / 11.8.800.94 Memory Corruptions (APSB13-21)
  2614. EMC NetWorker nsrpush Process Local Privilege Escalation
  2615. HP SiteScope SOAP Call runOMAgentCommand SOAP Request Arbitrary Remote Code Execution
  2616. Polycom SIP Detection
  2617. Polycom HDX < 3.1.1.2 Multiple Vulnerabilities
  2618. IBM WebSphere Service Registry and Repository Installed
  2619. IBM WebSphere Service Registry and Repository 7.0 < 7.0.0 FP1 Authentication Bypass
  2620. IBM Lotus Sametime Connect Client Installed
  2621. IBM Lotus Sametime Connect Client Mouseover XSS
  2622. Cisco IronPort PostX < 6.2.9.1 Multiple Vulnerabilities
  2623. IBM DB2 Content Manager eClient Detection
  2624. IBM DB2 Content Manager eClient < 8.4.1.1 Unspecified Security Vulnerability
  2625. Cisco ASA Next-Generation Firewall Fragmented Traffic DoS (cisco-sa-20130626-ngfw)
  2626. Cisco Unified MeetingPlace Detection
  2627. Cisco Unified MeetingPlace Multiple Session Weaknesses
  2628. Cisco TelePresence DSP Card Crafted RTP Packet H.264 Bit Stream Handling DoS
  2629. Defending against web-based malware: Spot the smoke, dont wait for fire
  2630. After Ten Years, Cracks In Microsofts Patch Program
  2631. iOS 7 patches 80 vulnerabilities
  2632. Linus Torvalds Admits He's Been Asked To Insert Backdoor Into Linux
  2633. Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
  2634. How I hacked SIM cards with a single text - and the networks DON'T CARE
  2635. Flaw In iOS 7 Lets Attackers Take Control Of Users' iPhones
  2636. 5 Tips to Protect Networks Against Shodan Searches - eSecurity Planet
  2637. Installing Dropbox? Prepare to lose ASLR. | codeinsecurity
  2638. Volvent Security R&D: Cloning an Infrared Disarming Remote of a Consumer Grade Home Security System
  2639. How did I get a root shell in my NAS, 0day inside
  2640. Would you believe it? Women more in favour of porn filters than men
  2641. Apple DDOS? Nope, just the update coming down!, (Wed, Sep 18th)
  2642. NSA Contract With VUPEN Revealed
  2643. Skimming made easier with hacked portable card payment machines
  2644. Security researchers create undetectable hardware trojans
  2645. Marissa Mayer does not lock her iPhone with a passcode- The Inquirer
  2646. Seagate to produce 5TB hard drive next year, 20TB by 2020
  2647. Apple's Fingerprint ID May Mean You Can't 'Take the Fifth'
  2648. Black Hat Announces First Ever West Coast Trainings Event
  2649. IT Pros Lack Security Management Support, Budget & Training
  2650. Flying in the US? Remember to leave your hand grenades at home
  2651. Tenable Network Security: Google Chrome v24 Windows STIG Audit
  2652. Tenable Network Security: CIS Red Hat Enterprise Linux 6 - Level...
  2653. Howto crawl web.xml with ruby to discover servlet urls for a pentest
  2654. Delete any Photo from Facebook by Exploiting Support Dashboard Arul Kumar.V
  2655. Researchers: Oracles Java Security Fails
  2656. NSA cracks HTTPS, SSL, 4G smartphone encryption | Digital Trends
  2657. The Router Review: From nmap to firmware | codeinsecurity
  2658. Russia's Cybercrime Market Reaches $1.9 Billion
  2659. 'Don't Travel Abroad' Russia warns Hackers
  2660. Red Hat CIO Takes an Open-Source Approach to Security and BYOD
  2661. People the weakest link in security
  2662. 5 Signs Of Trouble In Your Network
  2663. Android malware spotted hitching a ride on mobile botnet
  2664. Cacti < 0.8.8b Command and SQL Injections
  2665. Mitigated Patch Rates
  2666. Cisco Network Admission Control (NAC) Version
  2667. Cisco Network Admission Control Manager SQL Injection (cisco-sa-20130417-nac)
  2668. iLO 3 < 1.50 / iLO 4 < 1.13 Unspecified Information Disclosure
  2669. Apple AirPort Base Station (802.11n) Firmware < 7.6.4 Remote DoS (APPLE-SA-2013-09-06-1)
  2670. Stuxnet Expert Proposes New Framework For ICS/SCADA Security
  2671. NSA Laughs At PCs, Prefers Hacking Routers And Switches
  2672. 22 Years Later, The Linux And Open Source "Cancer" Is Wonderfully Benign
  2673. Stop treating your datacentre as if it were a laptop: Symantec
  2674. Tenable Network Security: CIS Microsoft Windows 8 - Level 1 -...
  2675. GroundWork Monitor Enterprise Detection
  2676. Amazon Linux AMI : puppet Arbitrary Code Execution (ALAS-2013-213)
  2677. Source: New York Times Website Hit by Cyber Attack
  2678. 10 Years Later: Could an Epic Blackout Happen Again?
  2679. PHP 5.5.x < 5.5.1 xml.c Buffer Overflow
  2680. RealPlayer for Windows < 16.0.3.51 Remote Buffer Overflow and Memory Corruption Vulnerabilities
  2681. Opera < 16.0 Multiple Vulnerabilities
  2682. TortoiseSVN Client Version Detection
  2683. RealPlayer for Windows < 16.0.3.51 Multiple Vulnerabilities
  2684. FileZilla Client Installed
  2685. Microsoft SQL Server STARTTLS Support
  2686. Cisco Nexus 1000V VEM DoS (CSCtj17451)
  2687. FileZilla Client < 3.7.2 SFTP Integer Overflow
  2688. HP LaserJet PJL Interface Directory Traversal (HPSBPI02575)
  2689. CiscoWorks Common Services Home Page Component Unspecified Shell Command Execution
  2690. FileZilla Client < 3.7.3 Multiple Vulnerabilities
  2691. Computer Associates ARCserve Backup LDBserver Remote Code Execution Vulnerability
  2692. RSA SecurID Software Token Converter Buffer Overflow
  2693. RSA SecurID Software Token Converter Buffer Overflow
  2694. Websense Email Security Installed
  2695. Websense Email Security SMTP Component Weak SSL/TLS Ciphers
  2696. WP Online Store Plugin for WordPress Multiple Parameter File Disclosure
  2697. Opera < 16 Multiple Vulnerabilities
  2698. SSL Certificate Chain Contains RSA Keys Less Than 2048 bits
  2699. Oracle TNS Listener Remote Poisoning
  2700. NSA: NOBODY could stop Snowden he was A SYSADMIN
  2701. The Body Worn "IMSI Catcher" For All Your Phone Snooping Needs
  2702. Getting To The Root Of Application Security Problems
  2703. Java 6 0-Day Exploit in the Wild Updated
  2704. Webantix: Webshot: Screenshot every web server during your pen test
  2705. BYOD How much do you love your corporate laptop?
  2706. Want to break some Android apps?
  2707. ISPs scramble to explain mouse-sniffing tool
  2708. Tesla Model S REST API Authentication Flaws
  2709. Poison Ivy RAT Becoming The AK-47 Of Cyber-Espionage Attacks
  2710. Cisco cracks down on security vulnerability
  2711. Talking Threats with Senior Management
  2712. Getting over the fear of measuring what matters
  2713. Installing Printers with PowerShell
  2714. Security Researcher Hacks Mark Zuckerbergs Wall To Prove His Exploit Works | TechCrunch
  2715. ISC Diary | Fibre Channel Reconnaissance - Reloaded
  2716. LinEnum - Scripted Linux Enumeration & Privilege Escalation Checks
  2717. levle/rdesktop-fuzzer GitHub
  2718. Nearly One-Fifth Of Enterprise Operating Systems Not Fully Patched
  2719. Hackers may cash in when XP is retired
  2720. PHP 5.4.x < 5.4.1 Multiple Vulnerabilities
  2721. PHP < 5.3.12 / 5.4.2 CGI Query String Code Execution
  2722. PHP < 5.3.11 Multiple Vulnerabilities
  2723. PHP 5.4.x < 5.4.18 Multiple Vulnerabilities
  2724. PHP 5.5.x < 5.5.2 Multiple Vulnerabilities
  2725. Google Chrome < 29.0.1547.57 Multiple Vulnerabilities
  2726. HP LoadRunner lrLRIServices ActiveX Control Code Execution Vulnerability
  2727. DotNetNuke __dnnVariable Parameter XSS
  2728. PHP 5.4.x < 5.4.18 Multiple Vulnerabilities
  2729. PHP 5.5.x < 5.5.2 Multiple Vulnerabilities
  2730. Sun SPARC Enterprise T5120 and T5220 Default Configuration Root Command Execution Vulnerability
  2731. HP LoadRunner < 11.52 Code Execution
  2732. RSA Authentication Agent Installed
  2733. Apple QuickTime MPEG-2 Playback Component Vulnerability
  2734. Cisco Unified Presence Server DoS (cisco-sa-20120912-cupxcp)
  2735. Cisco Unified Presence Server DoS (cisco-sa-20130227-cups)
  2736. DotNetNuke DNNArticle Module categoryid Parameter SQL Injection
  2737. Google Chrome < 29.0.1547.57 Multiple Vulnerabilities
  2738. PowerDNS Recursor 3.3.x / 3.4.x / 3.5 RC1 Domain Name Resolving Vulnerability
  2739. RSA Authentication Agent 7.1.x < 7.1.2 Authentication Bypass
  2740. Tumbleweed SecureTransport vcst_eu.dll ActiveX Control Buffer Overflows
  2741. CiscoWorks Common Services Installed
  2742. CiscoWorks Common Services Arbitrary Code Execution (cisco-sa-20101027-cs)
  2743. How Not to DDoS Your Former Employer
  2744. Bradley Manning sentenced to 35 years in prison The Register
  2745. US intelligence services go 'on the record' with new Tumblr blog | World news | theguardian.com
  2746. If You Send To Gmail, You Should Have 'No Legitimate Expectation Of Privacy' - Business Insider
  2747. Researchers release tool to pickup the SLAAC in Man-In-The-Middle attacks using IPv6 - Network World
  2748. Putty Security Update (SSH Tool)
  2749. Poison Ivy: Assessing Damage and Extracting Intelligence
  2750. Hackers use new tactic to attack U.S. media sites | Reuters
  2751. Attention, parents: Baby monitor hacked; default password to blame?
  2752. Zuckerberg Facebook hacker gets $10k fundraiser bug bounty
  2753. CSOs: Stop flogging the threats and start providing solutions
  2754. Bloke leaks '1000s' of Twitter login tokens, says he can hack ANY twit
  2755. Open Security Research: Remote Code Execution on Wired-side Servers over Unauthenticated Wireless
  2756. ZMap The Internet Scanner
  2757. Tenable Network Security: Tenable CIS Oracle 9i/10g v2.01 Audits
  2758. PuTTY < 0.63 Multiple Vulnerabilities
  2759. ModSecurity < 2.1.1 POST Data Null Byte Filter Bypass
  2760. ModSecurity < 2.5.9 Multipart Request Header Name DoS
  2761. ModSecurity < 2.7.0 Multipart Request Parsing Filter Bypass
  2762. ModSecurity < 2.7.3 XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
  2763. CA ARCserve Backup for Laptops and Desktops Server, CA Protection Suite, and CA Desktop Management Suite Integer Underflow
  2764. PuTTY 0.52 to 0.62 Multiple Vulnerabilities
  2765. Mac OS X Directory Service Buffer Overflow
  2766. Poison Ivy Detection
  2767. TrustPort WebFilter help.php hf Parameter Directory Traversal
  2768. HP ProCurve Identification
  2769. HP ProCurve 5400 zl Switches Compact Flash Card Security Issue
  2770. MS13-059: Cumulative Security Update for Internet Explorer (2862772)
  2771. MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2850869)
  2772. MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2876063)
  2773. MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege (2849470)
  2774. MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)
  2775. MS13-064: Vulnerability in Windows NAT Driver Could Allow Denial of Service (2849568)
  2776. MS13-065: Vulnerability in ICMPv6 Could Allow Denial of Service (2868623)
  2777. MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure (2873872)
  2778. MS KB2862966 : Updates to Improve Cryptography and Digital Certificate Handling in Windows
  2779. MS KB2861855: Updates to Improve Remote Desktop Protocol Network-Level Authentication
  2780. MS KB2862973: Update for Deprecation of MD5 Hashing Algorithm for Microsoft Root Certificate Program
  2781. Cisco Intrusion Prevention System Jumbo Frame Denial of Service (cisco-sa-20080618-ips)
  2782. HP ProCurve Switches Remote Unauthorized Information Disclosure
  2783. Adobe Camera Raw Plugin Multiple Vulnerabilities (Mac OS X)
  2784. PHP 5.5.x < 5.5.1 xml.c Buffer Overflow
  2785. BigTree CMS Detection
  2786. BigTree CMS index.php SQL Injection
  2787. Western Digital My Net Router main_internet.php Admin Credential Disclosure
  2788. OpenX flowplayer-3.1.1.min.js Backdoor Remote Code Execution
  2789. OSPF LSA Manipulation Vulnerability in Cisco ASA (cisco-sa-20130801-lsaospf)
  2790. OSPF LSA Manipulation Vulnerability in Cisco IOS (cisco-sa-20130801-lsaospf)
  2791. OSPF LSA Manipulation Vulnerability in Cisco IOS-XE (cisco-sa-20130801-lsaospf)
  2792. OSPF LSA Manipulation Vulnerability in Cisco NX-OS (cisco-sa-20130801-lsaospf)
  2793. HP Integrated Lights-Out authentication bypass
  2794. 10 years of Blaster: a retrospective
  2795. Buying Battles in the War on Twitter Spam
  2796. Schneier on Security: Stories from MI5
  2797. Can We End CSRF With Header-Based Browser Policies?
  2798. The More Things Change
  2799. Hacker 'Shouts Abuse' Via Foscam Baby Monitoring Camera
  2800. Leap Motion Controller exploit demoed by Malwarebytes
  2801. Every employee is now an IT employee, to some degree
  2802. Continuous Security Monitoring: Compliance
  2803. Cisco Security Switches
  2804. NetAppVoice: CxO Beware: Hacker-Snipers Aiming At You Right Now - Forbes
  2805. Why is notepad.exe connecting to the internet? | Strategic Cyber LLC
  2806. Wall Of Sheep Hacker Group Exposes NFC's Risks
  2807. GPS Jammer Accidentally Jams Up Newark Airport
  2808. Mainframes Hackable, But Do You Care?
  2809. London Bans Smartphone Snooping Garbage Bins
  2810. Raritan remote administration server detection
  2811. IPMI Server Detection
  2812. ClearSCADA server detection
  2813. Mozilla Thunderbird < 17.0.8 Multiple Vulnerabilities
  2814. Mozilla SeaMonkey < 2.20 Multiple Vulnerabilities
  2815. Mozilla Firefox < 23.0 Multiple Vulnerabilities
  2816. Symantec Web Gateway < 5.1.1 Multiple Vulnerabilities (SYM13-008)
  2817. Samba 3.0.x < 4.0.7 Denial of Service Vulnerability
  2818. Junos Pulse Secure Access Service (SSL VPN) Multiple XSS (JSA10554)
  2819. HP LaserJet Pro /dev/save_restore.xml Administrative Password Disclosure
  2820. Splunk < 5.0.4 X-FRAME-OPTIONS Clickjacking Weakness
  2821. Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities
  2822. Incomplete Thought: The Psychology Of Red Teaming Failure Do Not Pass Go
  2823. Windows Phone shows little market share growth
  2824. Black Hat hacker claims he can make $15k to $20k an hour
  2825. Hackers demonstrate Toyota Prius hijacking on video
  2826. Windows phones can be burned by rogue hotspots
  2827. HP plugs password-leaking printer flaw The Register
  2828. Hackers to NSA chief: Read the Constitution | Security & Privacy - CNET News
  2829. Car hacking code released at Defcon
  2830. Wi-Fi routers: More security risks than ever
  2831. #BlackHat Briefings USA 2013: Day Two Notes
  2832. #BlackHat Briefings USA 2013: Day One Notes
  2833. admin to SYSTEM win7 with remote.exe
  2834. Firefox Zero-Day Used in Child Porn Hunt?
  2835. Chinese hackers take over fake water utility
  2836. FBI allowed informants to break law more than 5,600 times in year
  2837. Android Apps Can Access All Of Your Google Account
  2838. Posh potty owners flushed by dodgy Bluetooth password
  2839. iOS Weaknesses Allow Attacks Via Trojan Chargers
  2840. Water-Utility Honeynet Illuminates Real-World SCADA Threats
  2841. Windows Phones open to hackers when connecting to rogue Wi-Fi
  2842. DNS Vulnerability Dashboard
  2843. Event Indicator Alert Dashboard
  2844. Web Services Indicator Dashboard
  2845. Event Indicator Alert Report
  2846. EAServer <= 6.3.1 / 6.2 Multiple Vulnerabilities
  2847. MySQL 5.6.x < 5.6.12 Multiple Vulnerabilities
  2848. Line Client Detection
  2849. Oracle VirtualBox Detection
  2850. Oracle VM VirtualBox 4.2 < 4.2.14 tracepath Local Denial of Service
  2851. WhatsApp Client Detection
  2852. Kakao Client Detection
  2853. Kakao Client Detection
  2854. Apache 2.4 < 2.4.5 Multiple Vulnerabilities
  2855. DRAC server detection
  2856. Intel Active Management Server Detection
  2857. Megarac server detection
  2858. QNX Server Detection
  2859. QNX Server Detection
  2860. ServerView server detection
  2861. Atvise Server Detection
  2862. Google Chrome < 28.0.1500.95 Multiple Vulnerabilities
  2863. Kingfisher Debug Terminal Detection
  2864. Apache Subversion < 1.8.1 / 1.7.11 Remote Denial of Service Vulnerability
  2865. Cisco IOS Extensible Authentication Protocol Vulnerability (cisco-sr-20071019-eap)
  2866. Blue Coat ProxySG SGOS Version
  2867. Blue Coat ProxySG Core File Information Disclosure
  2868. Blue Coat ProxySG Unspecified XSS
  2869. MyBB < 1.6.10 Multiple Vulnerabilities
  2870. RT 3.8.x < 3.8.17 / 4.x < 4.0.13 Multiple Vulnerabilities
  2871. Check Point ZoneAlarm Detection
  2872. Apache 2.4 < 2.4.5 Multiple Vulnerabilities
  2873. Ibrahim Balic takes credit for Apple Dev Centre attack, but will he shoulder the blame?
  2874. WordPress flaw could cause data leaks - IT News from V3.co.uk
  2875. Adam Gowdiak uncovers new vulnerability in Java 7 which opens door to 10-year-old attack
  2876. Integrating Vulnerability Management Into The Application Devleopment Process
  2877. True tales of (mostly) white-hat hacking
  2878. Hardware Hacking Trends
  2879. Nations Buying as Hackers Sell Flaws in Computer Code - NYTimes.com
  2880. SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones - Forbes
  2881. SSH Brute Force The 10 Year Old Attack That Still Persists | Sucuri Blog
  2882. Web Plugin Family Indicator Dashboard
  2883. HUAWEI network device detection
  2884. Google Chrome < 28.0.1500.71 Multiple Security Vulnerabilities
  2885. phpMyAdmin 4.0.x < 4.0.3 'view_create.php' Cross Site Scripting Vulnerability
  2886. Flash Player <= 10.3.183.90 / 11.7.700.225 Multiple Vulnerabilities (APSB13-17)
  2887. WeChat chat client detection
  2888. LINE chat client detection
  2889. KakaoTalk Client Detection
  2890. PHP Backdoor Script Detection
  2891. PHP Code Obfuscation
  2892. Apache 2.2.x < 2.2.25 Remote Denial of Service Vulnerability
  2893. PHP 5.3.x < 5.3.27 Information Disclosure
  2894. PHP 5.4.x < 5.4.17 Buffer Overflow
  2895. Samba 3.6.x < 3.6.6 Remote Security Bypass
  2896. phpMyAdmin 3.5.x < 3.5.8.1 / 4.x < 4.0.0-rc3 Multiple Vulnerabilities
  2897. Squid 3.2.x < 3.2.13 / 3.3.x < 3.3.8 Port Handling Denial of Service
  2898. Squid 3.x < 3.2.12 / 3.3.x < 3.3.7 idnsALookup HTTP Request Denial of Service
  2899. IBM Blade Center Advanced Management Console Detection
  2900. Dell iDRAC6 Multiple Vulnerabilities
  2901. Juniper Junos on SRX Series PIM DoS (JSA10573)
  2902. Juniper Junos SRX Series UAC Enforcer HTTP Remote Code Execution (JSA10574)
  2903. Juniper Junos OpenSSL Multiple Vulnerabilities (JSA10575)
  2904. Juniper Junos proxy-arp/arp-resp DoS (JSA10576)
  2905. Juniper Junos SRX Series TCP ALG DoS (JSA10577)
  2906. Juniper Junos SRX Series MSRPC DoS (JSA10578)
  2907. Juniper Junos SRX1400/3400/3600 Etherleak Information Disclosure (JSA10579)
  2908. Juniper Junos SSL/TLS Renegotiation DoS (JSA10580)
  2909. Apache 2.0 < 2.0.65 Multiple Vulnerabilities
  2910. Apache 2.2 < 2.2.25 Multiple Vulnerabilities
  2911. Oracle Linux 6 : kernel (ELSA-2013-1051)
  2912. Blue Coat Authentication and Authorization Agent (BCAAA) Installed
  2913. Blue Coat Authentication and Authorization Agent Remote Overflow
  2914. Adobe ColdFusion 9/9.0.1/9.0.2 On JRun DoS (APSB13-19) (credentialed check)
  2915. Apache Subversion < 1.6.23 / 1.7.x < 1.7.10 Multiple Remote DoS
  2916. IPMI Cipher Suite Zero Authentication Bypass
  2917. IPMI Cipher Suites Supported
  2918. McAfee ePolicy Orchestrator < 4.6.7 Multiple XSS
  2919. Oracle Database July 2013 Critical Patch Update
  2920. Symantec Mail Security for Exchange / Domino Autonomy KeyView Module Multiple Buffer Overflows
  2921. Symantec Mail Security for SMTP Autonomy KeyView Module Multiple Buffer Overflows
  2922. MySQL 5.1 < 5.1.70 Multiple Vulnerabilities
  2923. MySQL 5.5 < 5.5.32 Multiple Vulnerabilities
  2924. MySQL 5.6.x < 5.6.12 Multiple Vulnerabilities
  2925. Sun Java System Application Server Information Disclosure
  2926. Default password (dasdec1) for 'root' account
  2927. Apache Struts2 action: Parameter Arbitrary Remote Command Execution
  2928. IBM WebSphere Application Server 7.0 < Fix Pack 29 Multiple Vulnerabilities
  2929. IceWarp /rpc/gw.html XML External Entity Arbitrary File Disclosure
  2930. Oracle VM VirtualBox 4.2 < 4.2.14 tracepath Local Denial of Service
  2931. How Easily Can a Moving Car Be Hacked? | Motherboard
  2932. Why help desk employees are a social engineer's favorite target
  2933. Researchers To Highlight Weaknesses In Secure Mobile Data Stores --
  2934. Researchers hack Verizon device, turn it into mobile spy station | Reuters
  2935. Most enterprise networks riddled with vulnerable Java installations, report says
  2936. How the Glass hack works
  2937. Man arrested for having sex with pool raft | Norwalk Reflector
  2938. The Five Most Common Security Pitfalls In Software Development
  2939. Feds asked to sit out Defcon hacking conference this year
  2940. HP admits to backdoors in storage products
  2941. D-Link routers multiple security vulnerabilities
  2942. A Bad Talk Aint The End of the World
  2943. Six Tips: How To Protect Yourself From Mobile Attacks
  2944. Web Shells Collection Page Updated
  2945. 4 Things You Should Know Before Your Team Writes Another Line of Code
  2946. Asleep at the Wheel
  2947. Open Security Research: Potential attack vectors against Z-Wave
  2948. Microsoft gives Windows app developers 180 days to patch -- or else
  2949. US gov SMASHES UP TVs and MICE to nuke tiny malware outbreak
  2950. Siemens Sinema server detection
  2951. Honeywell server detection
  2952. Honeywell Building Network Adapter (BNA) server detection
  2953. HAProxy Multiple Denial of Service Vulnerabilities
  2954. GE Industrial server detection
  2955. Cooper Power Systems HMI/SCADA device detection
  2956. Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability (cisco-sa-20120926-cucm)
  2957. Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability (cisco-sa-20120926-ecc)
  2958. Plone spamProtect mailaddress Parameter XSS
  2959. Cryptocat 'encrypted' group chats may have been crackable for 7 months
  2960. Hacker Holes in Server Management System Allow 'Almost-Physical' Access | Threat Level | Wired.com
  2961. introducing zarp | forelsket & security
  2962. Top 10 Proactive Web Application Security Measures | WhiteHat Security Blog
  2963. INVASION of the UNDEAD ANDROIDS: Hackers can pwn 'nearly all' devices
  2964. Microsoft Offloads Heap Of Critical Fixes
  2965. Auditing NetApp Data ONTAP with Nessus
  2966. NetApp Data ONTAP Best Practices Audit
  2967. cURL/libcURL 'curl_easy_unescape()' Heap Memory Corruption Vulnerability
  2968. FileMaker Pro Software Sharing Detection
  2969. cURL/libcURL 'Curl_sasl_create_digest_md5_message()' Stack Buffer Overflow Vulnerability
  2970. HAProxy Trash Buffer Overflow Vulnerability
  2971. Multiple Avira Products PDF Handling Remote Denial-of-Service Vulnerability
  2972. cURL/libcURL GSS/Negotiate Feature Spoofing Security Vulnerability
  2973. cURL/libcURL Remote Input Validation Vulnerability
  2974. EAServer <= 6.3.1 Information Disclosure
  2975. cURL/libcURL 'tailmatch()' Function Information Disclosure Vulnerability
  2976. HAProxy 'tcp-request content' Buffer Overflow Vulnerability
  2977. Winamp < 5.63 Multiple Vulnerabilities
  2978. Winamp < 5.64 Multiple Vulnerabilities
  2979. Samba 3.6.x < 3.6.6 Remote Security Bypass
  2980. McAfee ePolicy Orchestrator Installed (credentialed check)
  2981. McAfee ePO Extension for McAfee Agent Blind SQL Injection
  2982. HP Data Protector Components Version Detection
  2983. Nuance PDF Reader pdfcore8.dll Heap Buffer Overflow
  2984. ModSecurity Version
  2985. ModSecurity < 2.1.1 POST Data Null Byte Filter Bypass
  2986. ModSecurity < 2.5.9 Multipart Request Header Name DoS
  2987. ModSecurity < 2.7.0 Multipart Request Parsing Filter Bypass
  2988. ModSecurity < 2.7.3 XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
  2989. ModSecurity < 2.7.4 forceRequestBodyVariable Action Handling DoS
  2990. IBM Lotus Domino 8.5.x < 8.5.3 FP 4 Multiple Vulnerabilities
  2991. Citrix Web Interface 5.x < 5.4 Unspecified XSS
  2992. Citrix AGEE Logon Portal Unspecified XSS
  2993. SCTP Reverse Shell
  2994. NSA hacking Chinese: it's self defense
  2995. Incomplete Thought: In-Line Security Devices & the Fallacies Of Block Mode
  2996. Is your modem secure? | Security Spread
  2997. Blind SQL Injection What is it Good For? | WhiteHat Security Blog
  2998. ISC Diary | HP iLO3/iLO4 Remote Unauthorized Access with Single-Sign-On
  2999. BeEF - The Browser Exploitation Framework Blog: Cross-domain communication with a JSP shell from a browser hooked with BeEF
  3000. The Problem With Networks ..... - SpiderLabs Anterior
  3001. Two malware programs help each other stay on computers
  3002. MIT researchers can see through walls using 'Wi-Vi'
  3003. Hackers in Africa are building their own aircraft
  3004. Microsoft pulls security update over software conflicts
  3005. With BlackBerry reportedly hacked, is anything secure?
  3006. Opera network cracked
  3007. 3 Stupid Corporation Tricks
  3008. Surrendering The Endpoint
  3009. PCI DSS Indicators Report
  3010. IT-Grundschutz BSI-100-2 Report Template
  3011. Vulnerabilities Over 30 Days Report
  3012. Vulnerabilities Over 30 Days Dashboard
  3013. IT-Grundschutz BSI-100-2 Dashboard
  3014. HP Data Protector Detection
  3015. VxWorks Detection
  3016. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU Update)
  3017. Google Chrome < 27.0.1453.116 Flash Click-Jacking
  3018. Symantec Endpoint Protection Manager < 12.1 RU3 (SYM13-005)
  3019. Cisco Security Device Manager Detection
  3020. ComOS network equipment detection
  3021. Emerson telnet server detection
  3022. Lantronix SCADA device detection
  3023. Mozilla Thunderbird < 17.0.7 Multiple Vulnerabilities
  3024. RuggedCom Server Version Detection
  3025. SIEMENS telnet server detection
  3026. Dropbox Software Detection
  3027. Sybase EAServer 6.3.1 < 6.3.1.07 Build 63107 / 6.2 < 6.2.0.12 Build 62012 Multiple Vulnerabilities
  3028. Novell ZENworks Configuration Management < 11.2.3a Monthly Update 1 Multiple Vulnerabilities (credentialed check)
  3029. Novell ZENworks Control Center File Upload Remote Code Execution (intrusive check)
  3030. Novell ZENworks Configuration Console Login.jsp language Parameter XSS
  3031. Google SketchUp < 8.0.11752 MAC Pict Buffer Overflow
  3032. Google SketchUp < 13.0.3689 SKP Multiple Vulnerabilities
  3033. Symantec Endpoint Protection Manager < 12.1 RU3 (SYM13-005) (credentialed check)
  3034. Mac OS X : Java for Mac OS X 10.6 Update 16
  3035. Mac OS X : Java for OS X 2013-004
  3036. Google Chrome < 27.0.1453.116 Flash Click-Jacking
  3037. Apache Struts2 OGNL Expression Handling Double Evaluation Error Remote Command Execution
  3038. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU)
  3039. Gallery 3.0.x < 3.0.8 Multiple XSS
  3040. Apache Struts2 Crafted Parameter Arbitrary OGNL Expression Remote Command Execution
  3041. IBM Notes 8.x < 8.5.3 IF4 HF2 / 9.x < 9.0 IF2 Code Execution
  3042. IBM Notes 8.5 < 8.5.3 IF4 HF2 / 9.0 < 9.0 IF2 Password Disclosure
  3043. Oracle Java SE Multiple Vulnerabilities (June 2013 CPU) (Unix)
  3044. Post-Scan Rules Application
  3045. FreeBSD : phpMyAdmin -- Global variable scope injection (1b93f6fe-e1c1-11e2-948d-6805ca0b3d42)
  3046. San Cristbal La Fuerza: Off-The-Radar Cigar
  3047. Smoked Up No.24
  3048. Arturo Fuente Don Carlos Lancero
  3049. Monte Pascoal Robusto
  3050. Cigar Tip: The Stogie Guys Guide to Summer
  3051. Whisky Review: Caol Ila 18 Year Old
  3052. Tastes and Flavors of Cigars
  3053. Top 10 Cigars Tips - Do's and Don'ts For Cigar...
  3054. Best Cigars For Weddings
  3055. Top 5 Cigars for Beginners - Buying Beginner...
  3056. Cigar Review: Leccia Tobacco Black
  3057. Cigar Review: Ditka Throwback by Camacho Cigars
  3058. Do you cover up your webcam?
  3059. Security issue in iOS Personal Hotspot
  3060. Sometimes, The PenTest Gods Shine On You - SpiderLabs Anterior
  3061. Critical Update Plugs 40 Security Holes in Java
  3062. Texas becomes first US state to ban warrantless email snooping
  3063. Beware Of HTML5 Development Risks
  3064. Security Needs More Designers, Not Architects
  3065. Wi-Fi Alliance launches 802.11ac certification program
  3066. EMET 4.0 is now available for download, (Tue, Jun 18th)
  3067. Wall Street To Host A Simulated Cyber War
  3068. DHS warns of vulns in hospital medical equipment
  3069. Compliance Is Bad for Security
  3070. The Value of a Hacked Email Account Krebs on Security
  3071. OpenSSL < 0.9.8y / 1.0.1d / 1.0.0k Multiple Vulnerabilities
  3072. Adobe AIR <= 3.7.0.1860 Memory Corruption (APSB13-16)
  3073. Flash Player <= 10.3.183.86 / 11.7.700.202 Memory Corruption (APSB13-16)
  3074. OID parsing
  3075. OID parsing
  3076. SIEMENS telnet server detection
  3077. Google Chrome for iOS < 26.0.1410.53 Multiple Vulnerabilities
  3078. Desktop Application Vulnerability Report
  3079. Cisco Software Vulnerabilities
  3080. Enterprise Application Vulnerability Report
  3081. EMC Software Vulnerabilities
  3082. Oracle Software Vulnerabilities
  3083. IBM Software Vulnerabilities
  3084. HP Software Vulnerabilities
  3085. Desktop Application Vulnerability Dashboard
  3086. Cisco Software Vulnerabilities
  3087. Enterprise Application Vulnerability Dashboard
  3088. EMC Software Vulnerabilities
  3089. Oracle Software Vulnerabilities
  3090. IBM Software Vulnerabilities
  3091. HP Software Vulnerabilities
  3092. XnView 2.x < 2.03 Multiple Buffer Overflow Vulnerabilities
  3093. Cisco Prime Network Control System Version
  3094. Cisco Prime Network Control System Default Credentials (cisco-sa-20130410-ncs)
  3095. Plone PloneFormGen Unspecified Arbitrary Code Execution
  3096. MS13-047: Cumulative Security Update for Internet Explorer (2838727)
  3097. MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229)
  3098. MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (2845690)
  3099. MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894)
  3100. MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571)
  3101. MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571) (Mac OS X)
  3102. MS KB2813430 : Update to Improve Cryptography and Digital Certificate Handling in Windows
  3103. MS KB2847928: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3104. Adobe AIR <= 3.7.0.1860 Memory Corruption (APSB13-16)
  3105. Flash Player <= 10.3.183.86 / 11.7.700.202 Memory Corruption (APSB13-16)
  3106. Adobe AIR for Mac <= 3.7.0.1860 Memory Corruption (APSB13-16)
  3107. Flash Player for Mac <= 10.3.183.86 / 11.7.700.203 Memory Corruption (APSB13-16)
  3108. Microsoft Windows Kernel Win32k.sys PATHRECORD chain Multiple Vulnerabilities
  3109. JBoss Enterprise Portal Platform 5.2.2 Security Update (RHSA-2013-0141)
  3110. JBoss Enterprise Portal Platform GateIn Portal Security Update (RHSA-2013-0613)
  3111. Wireshark 1.6.x < 1.6.16 Multiple DoS Vulnerabilities
  3112. Wireshark 1.8.x < 1.8.8 Multiple Vulnerabilities
  3113. VMware vCenter Chargeback Manager Installed
  3114. VMware vCenter Chargeback Manager Remote Code Execution (VMSA-2013-0008)
  3115. Jenkins < 1.514 / 1.509.1 and Jenkins Enterprise 1.466.x / 1.480.x < 1.466.14.1 / 1.480.4.1 Multiple Vulnerabilities
  3116. VMware vCenter Update Manager Detection (credentialed)
  3117. VMware vCenter Update Manager Multiple Vulnerabilities (VMSA-2012-0013)
  3118. IPv6 Under Attack?
  3119. Guy Hacked His House To Have Its Own Twitter Feed
  3120. Microsoft Borks Botnet Takedown In Citadel Snafu
  3121. Android Trojans spread by Bluetooth, hijack bank codes
  3122. 12 Endpoint Security Myths Dispelled
  3123. Print Services Vulnerabilities
  3124. Operating System Vulnerabilities
  3125. Vulnerability Trending with Scanning, Sniffing and Logging
  3126. Enterprise Management Software Vulnerabilities
  3127. Network Service Vulnerabilities
  3128. Application Development Vulnerabilities
  3129. Media Player Vulnerability Dashboard
  3130. Database Software Vulnerabilities
  3131. Adobe Software Vulnerabilities
  3132. Print Services Vulnerability Report
  3133. Operating System Vulnerability Report
  3134. Enterprise Management Software Vulnerabilities
  3135. Network Service Vulnerabilities
  3136. Vulnerability Trending with Scanning, Sniffing and Logging
  3137. Application Development Vulnerabilities
  3138. Media Player Vulnerabilty Report
  3139. Database Software Vulnerabilities
  3140. Adobe Software Vulnerabilities
  3141. Apache Subversion < 1.8.0 / 1.7.10 / 1.6.23 Multiple Vulnerabilities
  3142. Eclipse IDE Software Detection
  3143. Mac OS X : Safari < 6.0.5 Multiple Security Vulnerabilities
  3144. Google Chrome < 27.0.1453.110 Multiple Vulnerabilities
  3145. Mac OS X 10.8 < 10.8.4 Multiple Vulnerabilities (Security Update 2013-002)
  3146. CAPWAP Protocol Client Detection
  3147. CAPWAP Protocol Detection
  3148. CAPWAP Protocol Server Detection
  3149. LWAPP Protocol Detection
  3150. PROMOTIC SCADA Server Detection
  3151. ISC BIND 9.6-ESV-R9 / 9.8.5 / 9.9.3 Remote Denial of Service Vulnerability
  3152. PHP < 5.4.16 / 5.3.26 Heap Based Buffer Overflow Vulnerability
  3153. IBM Websphere DataPower server detection
  3154. IrfanView FlashPix Plugin < 4.36 Summary Information Property Set Handling Integer Overflow
  3155. Oracle GlassFish Server 3.0.1 < 3.0.1.7 / 3.1.2 < 3.1.2.5 Multiple Vulnerabilities (April 2013 CPU)
  3156. CoDeSys Gateway Service < 2.3.9.28 Use-After-Free
  3157. VMware vCenter Multiple Vulnerabilities (VMSA-2012-0013)
  3158. SAP Control SOAP Web Service Remote Code Execution (SAP Note 1414444)
  3159. Mac OS X 10.8 < 10.8.4 Multiple Vulnerabilities
  3160. Mac OS X Multiple Vulnerabilities (Security Update 2013-002)
  3161. Mac OS X : Safari < 6.0.5 Multiple Vulnerabilities
  3162. Trend Micro DirectPass < 1.6.0.1015 Multiple Vulnerabilities
  3163. VMware vCenter Server Multiple Vulnerabilities (VMSA-2012-0005)
  3164. Google Chrome < 27.0.1453.110 Multiple Vulnerabilities
  3165. Splunk 5.0.x < 5.0.3 Multiple Vulnerabilities
  3166. Mac OS X 10.7 / 10.8 Unauthorized File Access (remote check)
  3167. ISC BIND 9 Recursive Resolver Malformed Zone DoS
  3168. Siemens Solid Edge SEListCtrlX ActiveX Control SetItemReadOnly Method Memory Address Write Arbitrary Code Execution
  3169. Siemens Solid Edge WPHelper ActiveX Control OpenInEditor Method Arbitrary Command Execution
  3170. MediaWiki 1.19.x < 1.19.7 / 1.20.x < 1.20.6 Arbitrary File Upload
  3171. PHP 5.3.x < 5.3.26 Multiple Vulnerabilities
  3172. PHP 5.4.x < 5.4.16 Multiple Vulnerabilities
  3173. Plesk Panel Apache Arbitrary PHP Code Injection
  3174. SSL Null Cipher Suites Supported
  3175. HP Data Protector Multiple Vulnerabilities
  3176. Belarus Becomes World's Top Spammer
  3177. You Can Now Eat Your Passwords
  3178. Hackers Spawn Distributed Supercomputer On Way To Chess Record
  3179. IT departments won't exist in five years
  3180. How to see if your antivirus is actually working
  3181. GDS Blog - GDS Blog - Using Nessus to Audit VMware vSphereConfigurations
  3182. There is no Onion The Painful Reality of Defense in Depth
  3183. Bypassing internet filtering with Lahana
  3184. Counter-Strike? | CSO Blogs
  3185. De-ICE 1.40 LiveCD Hacking Challenge Released
  3186. 2012 Browser Security Comparative Analysis: Socially Engineered Malware | NSS Labs
  3187. Google researcher discloses zero-day exploit for Windows
  3188. LinkedIn aims to keep hackers out with two-factor login
  3189. How to Hack an iPhone With a USB Charger
  3190. Moving Safely From Detection To Automated Action
  3191. Nessus Website Screenshots Feature
  3192. Tenable Network Security: Tenable IT-Grundschutz BSI 100-2...
  3193. Tenable Network Security: DISA STIG AIX 6.1 Audit
  3194. HTTP 500 Detection (Client)
  3195. HTTP 4xx Detection (Client)
  3196. Squid 2.x / 3.x < 3.1.23 / 3.2.6 / 3.3.0.3 cachemgr.cgi DoS
  3197. MS Skydrive 'Cloud' Backup Service Detection
  3198. Tridium SCADA Server Version Detection
  3199. SAP Netweaver Version Detection
  3200. Rockwell Automation RSBizWare Detection
  3201. Mitsubishi Electric Device Version Detection
  3202. LabView Remote Management Interface Detection
  3203. HTTP 500 Detection
  3204. Web Development Software Vulnerabilities
  3205. Security Software Vulnerabilities
  3206. Remote Access Vulnerability Report
  3207. Storage and Backup Vulnerability Report
  3208. Office Suite Vulnerabilities
  3209. Update Services Vulnerabilities Report
  3210. Virtual Computing Vulnerabilities
  3211. Web Browser Vulnerability Report
  3212. Web Technology Vulnerability Report
  3213. Web Development Software Vulnerabilities
  3214. Security Software Vulnerabilities
  3215. Remote Access Vulnerabilities
  3216. Storage and Backup Vulnerabilities
  3217. Office Suite Vulnerabilities
  3218. Update Services Vulnerabilities
  3219. Virtual Computing Vulnerabilities
  3220. Web Browser Vulnerabilities
  3221. Web Technology Vulnerabilites
  3222. Default Password (openvpnas) for 'root' Account
  3223. Skype for Windows < 6.3.0.105 Multiple Vulnerabilities (uncredentialed check)
  3224. Skype < 6.3.0.105 Multiple Vulnerabilities (credentialed check)
  3225. DotNetNuke 7.0.x < 7.0.6 Unspecified Modal Window XSS
  3226. IBM HTTP Server for z/OS 5.3.0 Command Execution
  3227. Mitsubishi MX Component ActiveX Remote Code Execution
  3228. Cisco IOS ISM Module for ISR G2 Authentication Header DoS
  3229. Nitro Pro <= 7.5.0.29 Memory Corruption
  3230. Nitro Reader Installed
  3231. Nitro Reader <= 2.5.0.45 Memory Corruption
  3232. Interview With A Blackhat (Part 1) | WhiteHat Security Blog
  3233. Sunera Information Security Blog: Download Multiple Nessus Reports via the Nessus XML-RPC API
  3234. Improving the security of your SSH private key files Martin Kleppmanns blog
  3235. A closer look at a recent privilege escalation bug in Linux (CVE-2013-2094) at time to bleed by Joe Damato
  3236. Log file vulnerability in Apache server
  3237. Google cuts grace period for vendors of vulnerable software
  3238. Hacking Firmware And Detecting Backdoors -- Dark Reading
  3239. Alert-driven vs Exploration-driven Security Analysis
  3240. PayPal denies teenager reward for finding website bug
  3241. US weapons system designs were reportedly viewed by Chinese hackers
  3242. Aha, I see you switched on your mobile Wi-Fi. YOU FOOL!
  3243. Security boffins say music could trigger mobile malware
  3244. Saved-game bug dumped PlayStation 3 fans in hijackers' sights
  3245. US power grid the target of 'numerous and daily' cyber-attacks The Register
  3246. PayPal vulnerable to cross-site scripting again
  3247. Apache Tomcat 6.0.x < 6.0.37 Multiple Vulnerabilities
  3248. Apache Tomcat 7.0.x < 7.0.40 Information Disclosure
  3249. Mutiny < 5.0-1.11 Multiple Directory Traversals
  3250. Google Chrome < 27.0.1453.93 Multiple Vulnerabilities
  3251. Cisco Device Web Configuration Detection
  3252. Cisco Device Web Configuration Detection
  3253. Simple Comtools Remote Management Interface Detection
  3254. TalkSwitch VoIP Server Detection
  3255. QuickTime < 7.7.4 Multiple Vulnerabilities (Windows)
  3256. RT: Request Tracker < 3.8.17 / 4.0.13 Multiple Vulnerabilities
  3257. MediaWiki Arbitrary File Upload Vulnerability
  3258. Outstanding Remediations Tracking
  3259. Common Application Vendor Vulnerabilities
  3260. Web Service Vulnerabilities
  3261. Outstanding Remediations Tracking
  3262. Common Application Vendor Vulnerabilities
  3263. Web Service Vulnerabilities
  3264. Adobe Reader Enabled in Browser (Internet Explorer)
  3265. Adobe Reader Enabled in Browser (Google Chrome)
  3266. Adobe Reader Enabled in Browser (Mozilla Firefox)
  3267. Adobe Reader Enabled in Browser (Opera)
  3268. Adobe ColdFusion Multiple Vulnerabilities (APSB13-03) (credentialed check)
  3269. DotNetNuke Language Flag Selector Culture XSS
  3270. PCI-DSS Indicators Dashboard
  3271. ISC BIND 9 Assertion Error Resource Record RDATA Query Parsing Remote DoS
  3272. ISC BIND 9 DNS RDATA Handling DoS
  3273. ISC BIND 9 DNS64 Handling DoS
  3274. ISC BIND 9 libdns Regular Expressions Handling DoS
  3275. Clorius Controls SCADA Information Disclosure
  3276. JouleTemp environmental server detection
  3277. PostgreSQL < 8.3.20 / 8.4.13 / 9.0.9 / 9.1.5 Multiple Vulnerabilities
  3278. Proficy Portal SCADA server detection
  3279. Microsoft Security Essentials < v4.2 Local Privilege Escalation Vulnerability
  3280. PostgreSQL < 8.3.19 / 8.4.12 / 9.0.8 / 9.1.4 Multiple Vulnerabilities
  3281. PostgreSQL < 8.4.11 / 9.0.7 / 9.1.3 Multiple Vulnerabilities
  3282. Digi Rabbit FTP Server Detection
  3283. Digi Rabbit HTTP Server Detection
  3284. Flash Player <= 10.3.183.75 / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3285. Mozilla Thunderbird 17.x < 17.0.6 Multiple Vulnerabilities
  3286. Heatmiser server detection
  3287. iBoot Bar server detection
  3288. Mozilla Firefox 20.x <= 20 Multiple Vulnerabilities
  3289. OSMA Heating server detection
  3290. Sullair Econnect server detection
  3291. XControl Process Automation server detection
  3292. Adobe AIR <= 3.6.0.6090 Multiple Vulnerabilities (APSB13-11)
  3293. Adobe AIR <= 3.7.0.1530 Multiple Vulnerabilities (APSB13-14)
  3294. iTunes < 11.0.3 Multiple Vulnerabilities
  3295. Default Password (nsroot) for 'nsroot' Account
  3296. Citrix NetScaler Web Management Interface Default Administrator Credentials
  3297. e107 content_preset.php URI XSS
  3298. Clorius Controls ISC SCADA Detection
  3299. Clorius Controls ISC SCADA Information Disclosure
  3300. Adobe ColdFusion Authentication Bypass (APSB13-13)
  3301. Adobe ColdFusion Authentication Bypass (APSB13-13) (intrusive check)
  3302. Adobe ColdFusion Multiple Vulnerabilities (APSA13-03)
  3303. Adobe Acrobat < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15)
  3304. Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15)
  3305. Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15) (Mac OS X)
  3306. MS13-037: Cumulative Security Update for Internet Explorer (2829530)
  3307. MS13-038: Security Update for Internet Explorer (2847204)
  3308. MS13-039: Vulnerability in HTTP.sys Could Allow Denial of Service (2829254)
  3309. MS13-040: Vulnerabilities in .NET Framework Could Allow Spoofing (2836440)
  3310. MS13-041: Vulnerability in Lync Could Allow Remote Code Execution (2834695)
  3311. MS13-042: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2830397)
  3312. MS13-043: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2830399)
  3313. MS13-044: Vulnerability in Microsoft Visio Could Allow Information Disclosure (2834692)
  3314. Microsoft Windows Essentials Installed
  3315. MS13-045: Vulnerability in Windows Essentials Could Allow Information Disclosure (2813707)
  3316. MS13-046: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2840221)
  3317. MS KB2820197: Update Rollup for ActiveX Kill Bits
  3318. Microsoft Malicious Software Removal Tool Installed
  3319. MS Security Advisory 2846338: Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution
  3320. Adobe AIR <= 3.7.0.1530 Multiple Vulnerabilities (APSB13-14)
  3321. Flash Player <= 10.3.183.75 / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3322. Adobe AIR for Mac <= 3.7.0.1530 Multiple Vulnerabilities (APSB13-14)
  3323. Flash Player for Mac <= 10.3.183.75 / 11.7.700.169 Multiple Vulnerabilities (APSB13-14)
  3324. Mutiny < 5.0-1.11 Multiple Directory Traversals
  3325. iTunes < 11.0.3 Multiple Vulnerabilities (credentialed check)
  3326. iTunes < 11.0.3 Multiple Vulnerabilities (uncredentialed check)
  3327. iTunes < 11.0.3 Certificate Validation Vulnerability (Mac OS X)
  3328. HP-UX PHNE_42470 : s700_800 11.31 cumulative ARPA Transport patch
  3329. Juniper Junos SIP DoS (PSN-2013-04-911)
  3330. Juniper Junos Firewall Bypass DoS (PSN-2013-04-912)
  3331. Juniper Junos Proxy ARP DoS (PSN-2013-04-913)
  3332. Juniper Junos J-Web Remote Code Execution (PSN-2013-04-914)
  3333. Juniper Junos IPv6 Egress Filter DoS (PSN-2013-04-915)
  3334. Juniper Junos Invalid Ether-type DoS (PSN-2013-04-916)
  3335. Juniper Junos GRE DoS (PSN-2013-04-917)
  3336. Juniper Junos DNSSEC Validation DoS (PSN-2013-04-918)
  3337. CMS Hacking, A Look Into The ECCouncil Hack - Imperva Data Security Blog
  3338. Marco Ramilli's Blog: Firmware Hacking: The Samsung smart TV turn
  3339. The Difference Between a Vulnerability Assessment and a Penetration Test
  3340. How to hack an electric car-charging station
  3341. Security Risks of Too Much Security
  3342. ownCloud fixes critical security vulnerabilities
  3343. Catching hackers with virtual industrial plants
  3344. PentesterLab.com Excercises To Learn Penetration Testing
  3345. Bluetooth-Controlled Door Lock
  3346. Opinion: No, the LulzSec hackers werent noble
  3347. Which browser is safest? The answer may surprise you
  3348. Five Things Every Organization Should Know about Detecting And
  3349. Sony hacking suspect smashes computers to get out of prosecution
  3350. CCTV shows speed of theft outside a London restaurant on MSN Video
  3351. U.S. government becomes biggest buyer of malware
  3352. RTFM! NSA tome reveals THE TRUTH behind spooks on the web The Register
  3353. Are you obligated to point out security flaws if youre just hired for a small job? | Ars Technica
  3354. Building a low-end PC: Just say no | ZDNet
  3355. Microsoft Windows Wireless Network History
  3356. Microsoft Windows Wireless Network History
  3357. IBM solidDB Stored Procedure Call Remote Denial of Service
  3358. HP LaserJet Pro Printers Unauthorized Data Access (April 2013)
  3359. Exim with Dovecot use_shell Command Injection
  3360. IBM WebSphere Application Server 8.0 < Fix Pack 6 Multiple Vulnerabilities
  3361. IBM WebSphere Application Server 8.5 < Fix Pack 2 Multiple Vulnerabilities
  3362. Android Emulator Telnet Port on Remote Host
  3363. Android Emulator ADB Port on Remote Host
  3364. Joomla! 2.5.x < 2.5.10 / 3.0.x < 3.0.4 Multiple Vulnerabilities
  3365. MediaWiki 1.19.x < 1.19.6 / 1.20.x < 1.20.5 Multiple Vulnerabilities
  3366. nginx < 1.4.1 / 1.5.0 Stack Buffer Overflow Vulnerability
  3367. Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities
  3368. Apache CDorked backdoor detection
  3369. Citect SCADA client device detection
  3370. Citect SCADA device detection
  3371. National Instruments server detection
  3372. Flash Player <= 10.3.183.14 / 11.1.102.55 Multiple Vulnerabilities (APSB12-03)
  3373. Flash Player <= 10.3.183.15 / 11.1.102.62 Multiple Vulnerabilities (APSB12-05)
  3374. Flash Player <= 10.3.183.16 / 11.1.102.63 Multiple Memory Corruption Vulnerabilities (APSB12-07)
  3375. Flash Player <= 10.3.183.18 / 11.2.202.233 Object Confusion Vulnerability (APSB12-09)
  3376. ISC BIND 9 Cache Update Policy Deleted Domain Name Resolving Weakness
  3377. ISC BIND 9 Multiple Denial of Service Vulnerabilities
  3378. ISC BIND 9 Zero-Length RDATA Section Denial of Service / Information Disclosure
  3379. Introducing the Cigar Flavors Wheel
  3380. Review: Pinar Del Rio Reserva Superior Salomon | halfwheel
  3381. Commentary: Gold Star Smokes (Part VII)
  3382. Unique Cigars - List of Top Unique or Unusual Cigars
  3383. Oliva Atlantic Cigar Company 15th Anniversary Diadema
  3384. Cigar Review: Asylum 13 6 x 80
  3385. 5 Ways to Use Your Cigar Bands
  3386. The Economist on Guantanamo
  3387. Security Lessons From Star Wars: Breach Response
  3388. The Onion and Breach Disclosure
  3389. Use These Secret NSA Google Search Tips to Become Your Own Spy Agency | Threat Level | Wired.com
  3390. Panic Now
  3391. Bang With Friends on iPhone, Android
  3392. Quantifying Risk Tolerance
  3393. Hackers gain access to all .edu domains
  3394. BBC News - Working gun made with 3D printer
  3395. Twitter hack on the Onion makes for comedy gold - The Frontline - a blog from V3.co.uk
  3396. National Republican Congressional Committee Website Hacked With Viagra Ads
  3397. Traffic From Syria Disappears From Internet
  3398. Use of 'honeywords' can expose password crackers
  3399. Software Summary
  3400. SANS Top 20 Report Template
  3401. Consolidation Report for Missing Patches
  3402. VLC Media Player < 2.0.6 ASF Demuxer Buffer Overflow
  3403. HP Intelligent Management Center < 5.2 E0401 Multiple Vulnerabilities
  3404. Webmin <= 1.580 Multiple Input-Validation Vulnerabilities
  3405. Lantronix SCADA device detection
  3406. Mozilla Firefox 7.0 Multiple Vulnerabilities
  3407. Mozilla Thunderbird 7.0 Multiple Vulnerabilities
  3408. Opto 22 SCADA device detection
  3409. Mozilla Firefox <= 11 Multiple Vulnerabilities
  3410. Mozilla SeaMonkey 2.x < 2.9.0 Multiple Vulnerabilities
  3411. Mozilla Thunderbird < 12 Multiple Vulnerabilities
  3412. Apache 2.2 < 2.2.17 Multiple Vulnerabilities
  3413. Clorius Controls SCADA device detection
  3414. Novell GroupWise Internet Agent Unsupported
  3415. op5 Monitor < 5.7.3 Multiple Vulnerabilities
  3416. IBM Tivoli Endpoint Manager Web Server Detection
  3417. IBM Tivoli Endpoint Manager Server < 8.2.1372 Multiple Vulnerabilities
  3418. Google Apps Directory Sync Detection (Windows)
  3419. Google Apps Directory Sync < 3.1.6 Weak Stored Credential Local Disclosure
  3420. HP Managed Printing Administration < 2.7.0 XSS
  3421. VMware Security Updates for vCenter Server (VMSA-2013-0006)
  3422. Unix Operating System on Extended Support
  3423. Patch Report
  3424. Novell iPrint Client < 5.90 Stack-Based Buffer Overflow
  3425. Juniper Junos Unspecified DoS (PSN-2013-01-818)
  3426. X Server Unauthenticated Access: Screenshot
  3427. Open IP ports let anyone track ships on Internet
  3428. Printers, routers used as bots in DDoS attacks
  3429. The 7 elements of a successful security awareness program
  3430. Smart-Meter Blackouts Risk To UK
  3431. Ultra-Hackable Google Glass Could Be A Security Nightmare
  3432. Warnings Of Poor Security In Surveillance Cams
  3433. Practical HTTP Host Header Attacks
  3434. Websites Harbor Fewer Flaws, But Most Have At Least One Serious Vulnerability
  3435. Another Hack, Another 50M Passwords Time for SecureAuth IdP for the Enterprise
  3436. XSS Vulnerability in Cisco sub domain found by 14 Years Old security researcher
  3437. absorptions: Eavesdropping on a wireless keyboard
  3438. First BYOD, now BYON poses security challenge
  3439. Man accused of placing GPS device on victim's car before burglarizing her home
  3440. Serial Killer Hack Threat To Gas Pipes, Traffic Lights, Power Plants
  3441. MySQL Server 5.1.x < 5.1.68 Multiple Vulnerabilities
  3442. MySQL Server 5.1.x < 5.1.69 Multiple Vulnerabilities
  3443. MySQL Server 5.5.x < 5.5.30 yaSSL Buffer Overflow
  3444. MySQL Server 5.5.x < 5.5.31 Multiple Vulnerabilities
  3445. MySQL Server 5.6.x < 5.6.11 Multiple Vulnerabilities
  3446. Bing search string
  3447. Google search string
  3448. Siemens SCALANCE SCADA device detection
  3449. Siemens SCALANCE SCADA device detection
  3450. Siemens Simatic SCADA device detection
  3451. Vonage VoIP phone detection
  3452. Vonage VoIP phone detection
  3453. Yahoo search string
  3454. SANS Top 20 Dashboard
  3455. Plesk Horde Detection
  3456. Traffic Analyzer Plugin for WordPress ta_loaded.js.php aoid Parameter XSS
  3457. MySQL 5.1 < 5.1.69 Multiple Vulnerabilities
  3458. MySQL 5.5 < 5.5.31 Multiple Vulnerabilities
  3459. MySQL 5.6.x < 5.6.11 Multiple Vulnerabilities
  3460. JBoss Web Services Endpoint Enumeration
  3461. JBossWS Endpoint Uses Unsafe Encryption
  3462. MediaWiki 1.19 < 1.19.5 / 1.20 < 1.20.4 Multiple Vulnerabilities
  3463. Cisco IOS Generic Input/Output SNMP DoS
  3464. phpMyAdmin 3.5.x < 3.5.8 tbl_gis_visualization.php Multiple XSS
  3465. VLC < 2.0.6 ASF Demuxer Buffer Overflow
  3466. Puppet Unsafe YAML Unserialization
  3467. Puppet Multiple Vulnerabilities (2013/03/12)
  3468. D-Link DIR-645 getcfg.php Admin Password Disclosure
  3469. IBM Lotus Domino 8.5.x < 8.5.3 Multiple Vulnerabilities
  3470. IBM Lotus Domino 8.5.x Multiple Vulnerabilities
  3471. News: Internet Sales Tax Bill Poised to Hit Cigars Hard
  3472. Diamond Crown Julius Caeser Robusto
  3473. Cigar Review: Tatuaje Reserva J21
  3474. Cigar Review: Eddie Ortega Wild Bunch Dandy McCoy
  3475. Asylum 13 Fifty
  3476. Assessment Update: Tatuaje Anarchy
  3477. News: Leccia White Begins Shipping, Black Close Behind
  3478. Review: Viaje Friends and Family Le Joueur | halfwheel
  3479. Serial threat on the internet
  3480. Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys - Slashdot
  3481. Out of Your Password Minder - YouTube
  3482. Verizon Fingers China
  3483. TSA Tables Plan To Allow Knives On Planes
  3484. US Air Force beats off competition in NSA hacking fight The Register
  3485. Twitter may introduce two-step authentication after recent hacking incidents
  3486. Adobe's first CSO sets security of hosted services as top priority
  3487. Self-Proclaimed LulzSec Leader Arrested In Australia
  3488. Australian police arrest senior member of LulzSec hacking group
  3489. Self-Proclaimed LulzSec Leader Arrested In Australia
  3490. Australia hacking 'leader' charged
  3491. 'Self-Proclaimed' Leader Of LulzSec Arrested
  3492. Australia charges man claiming to be LulzSec leader
  3493. Australian police arrest alleged leader of LulzSec hacking group
  3494. Australia charges man claiming to be LulzSec leader
  3495. The Problem of Redaction | Restricted Data
  3496. 10 tips to secure funding for a security program
  3497. Sitecom routers backdoor account
  3498. Oracle critical patch plugs 128 security vulns
  3499. CCE to NIST 800-53 Reports
  3500. CCI to NIST 800-53 Reports
  3501. CCE Mapping to NIST 800-53 Chapters
  3502. CCI Mapping to NIST 800-53 Chapters
  3503. Windows Password and Account Audits by Asset
  3504. Google Chrome OS detection
  3505. Google Chrome OS < 26.0.1410.57 Multiple Security Vulnerabilities
  3506. ABB RTU560 Substation Automation detection
  3507. EnergyICT RTU device detection
  3508. Indas Web Scada device detection
  3509. Moxa Scada device detection
  3510. SoftPLC Scada device detection
  3511. Mac OS X : Safari < 6.0.4 SVG File Handling Arbitrary Code Execution
  3512. Oracle Java JDK / JRE / SE Multiple Vulnerabilities (April 2013 CPU)
  3513. Windows 7/8 metadata download
  3514. Cerb Detection
  3515. Lenovo ThinkPad Bluetooth with Enhanced Data Rate Detection
  3516. Cerb Multiple Vulnerabilities
  3517. Lenovo ThinkPad Bluetooth with Enhanced Data Rate Arbitrary DLL Injection Code Execution Vulnerability
  3518. MantisBT 1.2.x < 1.2.14 adm_config_report.php Multiple Parameter XSS
  3519. Cisco AnyConnect Secure Mobility Client 2.x / 3.x < 3.1(3103) Host Scan Multiple Vulnerabilities
  3520. IBM Rational ClearQuest 7.1.x < 7.1.2.10 Web Client XSS (credentialed check)
  3521. What is the Real Cost of Security?
  3522. Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail ReadWrite
  3523. top-5-mistakes.jpg 8004,068 pixels
  3524. When Offense and Defense Become One
  3525. Kali Linux review and a brief history of the BackTrack pentesting distro
  3526. iPhone Pen Testing Tools without Jailbreaking
  3527. Time To Dump Antivirus As Endpoint Protection?
  3528. Popular home routers contain critical security vulnerabilities
  3529. Twitter's recipe for security awareness
  3530. Microsoft Pulls Back Patch After Crashing PCs
  3531. Thousands Of WordPress Accounts Hit In Dictionary Attack
  3532. Air Force reclassification of cyber tools as weapons sparks speculation
  3533. Introduction to SecurityCenter Continuous View
  3534. CIS Linux and Unix Dashboard
  3535. CIS SUSE Summary
  3536. CIS RHEL Summary
  3537. CIS Linux and Unix Summary
  3538. Opera < 12.15 Multiple Vulnerabilities
  3539. Flash Player <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3540. Flash Player <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3541. Asterisk Multiple Vulnerabilities (AST-2013-001 / AST-2013-002 / AST-2013-003)
  3542. GE Cimplicity HMI/SCADA server detection
  3543. Squid 3.x < 3.2.9 / 3.3.3 strHdrAcptLangGetItem Malformed Accept-Language Denial of Service
  3544. Sophos Web Protection Detection
  3545. Sophos Web Protection Appliance patience.cgi id Parameter Directory Traversal
  3546. MS13-028: Security Update for Internet Explorer (2817183)
  3547. MS13-029: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)
  3548. MS13-030: Vulnerability in SharePoint Could Allow Information Disclosure (2827663)
  3549. MS13-031: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2813170)
  3550. MS13-032: Vulnerability in Active Directory Could Lead to Denial of Service (2830914)
  3551. MS13-033: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2820917)
  3552. MS13-034: Vulnerability in Microsoft Antimalware Client Could Allow Elevation of Privilege (2823482)
  3553. MS13-035: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2821818)
  3554. MS13-036: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2829996)
  3555. MS KB2833510: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3556. Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection Denial of Service Vulnerability (cisco-sa-20130327-cce)
  3557. Cisco IOS Software Internet Key Exchange Vulnerability (cisco-sa-20130327-ike)
  3558. Cisco IOS Software IP Service Level Agreement Vulnerability (cisco-sa-20130327-ipsla)
  3559. Cisco IOS Software Network Address Translation Vulnerability (cisco-sa-20130327-nat)
  3560. Cisco IOS Software Protocol Translation Vulnerability (cisco-sa-20130327-pt)
  3561. Cisco IOS Software Resource Reservation Protocol Denial of Service Vulnerability (cisco-sa-20130327-rsvp)
  3562. Cisco IOS Software Smart Install Denial of Service Vulnerability (cisco-sa-20130327-smartinstall)
  3563. IBM InfoSphere Data Replication Dashboard Detection
  3564. IBM InfoSphere Data Replication Dashboard Default Credentials
  3565. IBM InfoSphere Data Replication Dashboard User Enumeration
  3566. IBM InfoSphere Data Replication Dashboard Unpassworded User Enumeration
  3567. Asterisk SIP SDP Buffer Overflow (AST-2013-001)
  3568. Asterisk HTTP Content-Length Header DoS (AST-2013-002)
  3569. Asterisk SIP Channel Driver Username Disclosure (AST-2013-003)
  3570. MediaWiki 1.19 < 1.19.4 / 1.20 < 1.20.3 Multiple Vulnerabilities
  3571. MediaWiki mwdoc-filter.php Arbitrary File Access
  3572. mnoGoSearch Detection
  3573. mnoGoSearch search.cgi QUERY_STRING Parameter Parsing Arbitrary File Access
  3574. Adobe AIR 3.x <= 3.6.0.6090 Multiple Vulnerabilities (APSB13-11)
  3575. Flash Player <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3576. Adobe AIR for Mac 3.x <= 3.6.0.6090 Multiple Vulnerabilities (APSB13-11)
  3577. Flash Player for Mac <= 10.3.183.68 / 11.6.602.180 Multiple Vulnerabilities (APSB13-11)
  3578. Shockwave Player <= 12.0.0.112 Multiple Vulnerabilities (APSB13-12)
  3579. MongoDB Detection
  3580. MongoDB Web Interface Detection
  3581. Novell Identity Manager Role Based Provisioning Module Detection
  3582. Novell Identity Manager Role Based Provisioning Module Unspecified Vulnerability
  3583. Citrix Access Gateway Administrative Web Interface Default Credentials
  3584. Citrix Access Gateway User Web Interface Detection
  3585. Citrix Access Gateway 5.x < 5.0.4.223524 Unspecified Security Bypass
  3586. A Sweet Script to Dump Keys from Wlan Profiles - Post Exploitation (or Regular Use)
  3587. Hackers Guide to Stay out of Jail 2: Dos and Donts
  3588. Anatomy of an exploit - Linksys router remote password change hole
  3589. Is Education Key to Closing the Door on Hackers?
  3590. U.S. Air Force designates six cyber tools as weapons
  3591. Porn Sites Pose Growing Malware Risk
  3592. Hackers could start abusing electric car chargers to cripple the grid, researcher says
  3593. Vulnerabilities in aircraft systems allow remote airplane hijacking, researcher says
  3594. SSH an ill-managed mess says SSH author Tatu Ylonen
  3595. Exploits By Platform
  3596. FIX client LOGON detection
  3597. FIX client PGP LOGON detection
  3598. FIX Server Detection
  3599. FIX Server LOGON detection
  3600. Varnish Cache Detection
  3601. PostgreSQL < 8.3.23 / 8.4.16 / 9.0.12 / 9.1.8 / 9.2.3 Denial of Service
  3602. PostgreSQL < 8.3.23 Multiple Vulnerabilities
  3603. PostgreSQL < 8.4.17 Multiple Vulnerabilities
  3604. PostgreSQL < 9.0.13 Multiple Vulnerabilities
  3605. PostgreSQL < 9.1.9 / 9.2.4 Multiple Vulnerabilities
  3606. Gallery Detection
  3607. Gallery < 3.0.5 Multiple Vulnerabilities
  3608. Piwigo Detection
  3609. Piwigo install.php dl Parameter Traversal Arbitrary File Access
  3610. Core FTP < 2.2 build 1769 Multiple Buffer Overflows
  3611. Microsoft Windows Portable Devices
  3612. VNC Server Unencrypted Communication Detection
  3613. Default Password (facepunch) for 'chronos' Account
  3614. Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3615. Firefox 19.x Multiple Vulnerabilities (Mac OS X)
  3616. Thunderbird 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3617. Thunderbird ESR 17.x < 17.0.5 Multiple Vulnerabilities (Mac OS X)
  3618. Firefox ESR 17.x < 17.0.5 Multiple Vulnerabilities
  3619. Firefox 19.x Multiple Vulnerabilities
  3620. Mozilla Thunderbird 17.x < 17.0.5 Multiple Vulnerabilities
  3621. Mozilla Thunderbird ESR 17.x < 17.0.5 Multiple Vulnerabilities
  3622. SeaMonkey 2.16.x Multiple Vulnerabilities
  3623. AMI Firmware Source Code, Private Key Leaked | threatpost
  3624. Command Injection Tips: Leveraging Command-line Kung Fu with nslookup
  3625. Bitcoin-mining malware enslaves computers
  3626. Veracode Predicts Rise of "Everyday Hacker"
  3627. Parking Ticket Firm Exposes Private Information
  3628. Fake Twitter Followers Becomes Multimillion Dollar Business
  3629. Upgrading a router with impeccable soldering skills
  3630. How to Dress Like a Cyber Warrior OR Looking Like a Tier-Zero Hero
  3631. How Attackers Choose Which Vulnerabilities To Exploit
  3632. 'Arrested Development' to debut on Netflix on May 26
  3633. Advanced Persistent Threats get more advanced, persistent and threatening
  3634. Report: Nearly 94% Of Endpoints Running Java Are Vulnerable To Exploit | Security Bistro
  3635. Cisco IOS Patching: Defense and Offense | Didier Stevens
  3636. RaiderSec: Introducing dumpmon: A Twitter-bot that Monitors Paste-Sites for Account/Database Dumps and Other Interesting Content
  3637. Passpat - DigiNinja
  3638. Cybersh** just got real
  3639. Many Amazon S3 cloud storage users are exposing sensitive company secrets, claims report |
  3640. 0xdabbad00.com Blog Archive Windows Hardening Guide
  3641. Digital cameras easily turned into spying devices, researchers prove
  3642. Three reasons you shouldn't neglect your application security
  3643. Got Attitude?
  3644. Thousands of paroled CA sex offenders, felons easily disable GPS monitors
  3645. Brace for more mega-DDoS attacks, security experts warn
  3646. Samba 4.x < 4.0.4 AD DC File Permissions
  3647. RealPlayer for Mac < 12.0.1.1738 Heap Buffer Overflow Vulnerability
  3648. RealPlayer for Windows < 16.0.1.18 Heap Buffer Overflow Vulnerability
  3649. GLBA Malicious Code Prevention Compliance
  3650. Novell Messenger Client Detection (Mac OS X)
  3651. Novell Messenger Client Detection
  3652. Novell Messenger Client Import Command Remote Code Execution
  3653. Apple OS X Profile Manager Device Management Private Interface Managed Device Enumeration
  3654. Eye-Fi Helper Detection
  3655. Eye-Fi Helper < 3.4.23 Directory Traversal
  3656. Stunnel Detection
  3657. Stunnel 4.21 - 4.54 Multiple Vulnerabilities
  3658. Google Chrome < 26.0.1410.43 Multiple Vulnerabilities
  3659. MS KB2819682: Security Updates for Microsoft Windows Store Applications
  3660. Viscosity VPN Client Detection (Mac OS X)
  3661. Viscosity ViscosityHelper Symlink Attack Local Privilege Escalation
  3662. Viscosity VPN Client Detection
  3663. Git Repository Served by Web Server
  3664. Patch Management: Tivoli Endpoint Manager Get Installed Packages
  3665. GD Star Rating Plugin for WordPress export.php Authentication Bypass Information Disclosure
  3666. MariaDB 5.5 < 5.5.28 Multiple Vulnerabilities
  3667. MariaDB 5.5 < 5.5.30 Multiple Vulnerabilities
  3668. MySQL 5.1 < 5.1.68 Multiple Vulnerabilities
  3669. MySQL 5.5 < 5.5.30 yaSSL Buffer Overflow
  3670. VMSA-2013-0004 : VMware ESXi security update for third party library
  3671. ISC BIND 9 libdns Regular Expression Handling DoS
  3672. McAfee Vulnerability Manager Detect
  3673. McAfee Vulnerability Manager cert_cn Parameter XSS
  3674. Oracle Java JRE Universally Enabled
  3675. Oracle Java JRE Enabled (Google Chrome)
  3676. Oracle Java JRE Enabled (Mozilla Firefox)
  3677. Oracle Java JRE Enabled (Opera)
  3678. Oracle Java JRE Enabled (Internet Explorer)
  3679. Ubuntu low-mem install for VMs
  3680. Passcode lock can be bypassed in iOS 6.1.3 as well
  3681. Remember Your Helmet
  3682. Critical Flaw Threatens Millions of BIND Servers
  3683. Too Scared To Scan
  3684. Oz states count cars using Bluetooth
  3685. Network security study reveals 26,000 undetected malware samples
  3686. Whoops! Tiny Bug In NetBSD 6.0 Code Ruins SSH Crypto Keys
  3687. Security-Bug Rating System Gets A Makeover
  3688. Securosis Blog | Identifying vs. Understanding Your Adversaries
  3689. The World Has No Room For Cowards Krebs on Security
  3690. A Penetration Tester's Pledge
  3691. T-Mobile Wi-Fi Calling Security Analysis
  3692. Cisco switches to weaker hashing scheme, passwords cracked wide open | Ars Technica
  3693. Spy-Pi: Do you trust your laptop docking stations?
  3694. Detection of FTP client over non-standard port
  3695. Apple iOS < 6.1.3 Multiple Vulnerabilities
  3696. GLBA Section 501 (b) Host Configuration Auditing Compliance
  3697. Windows Wireless SSID Detection
  3698. GLBA Malicious Code Prevention
  3699. Samsung Kies < 2.5.0.12094_27_11 Multiple ActiveX Control Vulnerabilities
  3700. Foxit Advanced PDF Editor Installed
  3701. Foxit Advanced PDF Editor 3.x < 3.0.4.0 Security Cookie Stack-based Buffer Overflow
  3702. PHP-Fusion Authenticate.class.php Multiple Cookie SQL Injection
  3703. PHP-Fusion forum/viewthread.php highlight Parameter XSS
  3704. HP LaserJet Pro Printers Unauthorized Data Access
  3705. RealPlayer for Windows < 16.0.1.18 MP4 Heap-Based Buffer Overflow
  3706. Unsupported Novell NetWare Operating System
  3707. Apple iOS < 6.1.3 Multiple Vulnerabilities
  3708. Honeywell Multiple Products HscRemoteDepoy.dll ActiveX Control Arbitrary Code Execution
  3709. ClamAV < 0.97.7 Multiple Vulnerabilities
  3710. Foscam Detection
  3711. Foscam 11.37.2.x < 11.37.2.49 Directory Traversal
  3712. Were All Weev Now!
  3713. Botnet Business Booming - Dark Reading
  3714. 300 UK domains pilfered, massive security lapse blamed
  3715. US military boffins seek bulletproof Wi-Fi network - IT News from V3.co.uk
  3716. Would a 3D-printed gun really be legal?
  3717. Researcher sets up illegal 420,000 node botnet for IPv4 internet map
  3718. Cisco slip puts hardware at risk
  3719. HIPAA 45 CFR 164.308 and 312 Summary
  3720. HIPAA Monitoring Report
  3721. Microsoft Windows Unquoted Service Path Enumeration
  3722. Indicators
  3723. HIPAA Monitoring Summary
  3724. HIPAA Monitoring
  3725. Wipe the drive! Stealthy Malware Persistence - Part 2, (Thu, Mar 14th)
  3726. Security Appliances Are Riddled with Serious Vulnerabilities, Researcher Says - CIO.com
  3727. Schneier on Security: Security Theater on the Wells Fargo Website
  3728. Virtual Patching Cheat Sheet - OWASP
  3729. North Korea's Internet returns after 36-hour outage
  3730. Honeypot for phony waterworks gets hammered on Internet
  3731. CCTV hack takes casino for $33 MILLION in poker losses
  3732. Google, Mozilla, and Apple made the most vulnerable software of 2012
  3733. Reuters staffer accused of aiding hackers
  3734. Huawei 3G/4G USB sticks put users' security at risk
  3735. Skype can be intercepted by intelligence agencies
  3736. U.S. National Vulnerability Database Hacked
  3737. Apple not ready to kill OS X Snow Leopard yet
  3738. Tenable Network Security: MSCM Microsoft Server 2012 Domain...
  3739. Tenable Network Security: Tenable CIS Microsoft Internet Explorer...
  3740. Tenable Network Security: CIS Microsoft Windows Server 2012...
  3741. Tenable CSO praises APT1 report as a standard for information sharing
  3742. PHP 5.4.x < 5.4.12 Multiple Vulnerabilities
  3743. Flash Player <= 10.3.183.67 / 11.6.602.171 Multiple Vulnerabilities (APSB13-09)
  3744. Google Chrome < 25.0.1364.160 WebKit Type Confusion Code Execution
  3745. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3746. Mac OS X : Safari < 6.0.3 Multiple Vulnerabilities
  3747. Apt Updater Detection
  3748. CoDeSys Gateway Service Detection (SCADA)
  3749. CoDeSys Gateway Service Failed Login Detection (SCADA)
  3750. CoDeSys Gateway Service Unprotected (SCADA)
  3751. Mac OS X 10.8 < 10.8.3 Multiple Vulnerabilities (Security Update 2013-001)
  3752. PHP 5.3.x < 5.3.22 Multiple Vulnerabilities
  3753. PHP 5.4.x < 5.4.12 Multiple Vulnerabilities
  3754. airVision NVR path Parameter Traversal Arbitrary File Access
  3755. LogAnalyzer asktheoracle.php query Parameter XSS
  3756. Scrutinizer < 10.1.2 Multiple Vulnerabilities
  3757. KSplice : Installed Patches
  3758. Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution
  3759. Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution
  3760. Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution
  3761. Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution
  3762. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3763. Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution
  3764. Jenkins Detection
  3765. Jenkins < 1.498 / 1.480.2 Unspecified Master Cryptographic Key Information Disclosure
  3766. Jenkins < 1.502 / 1.480.3 Multiple Vulnerabilities
  3767. Insecure Windows Service Permissions
  3768. Foswiki Detection
  3769. Foswiki < 1.1.8 MAKETEXT Macro Arbitrary Code Injection
  3770. Ruby ftpd Gem filename Parameter Remote Command Execution
  3771. Malicious Process Detection: User Defined Malware Running
  3772. PDF-XChange Viewer < 2.5 Build 208 JPEG Processing Buffer Overflow
  3773. Novell ZENworks Mobile Management Detection
  3774. Novell ZENworks Mobile Management MDM.php Local File Inclusion
  3775. IBM Data Studio Detection
  3776. IBM Data Studio 3.1 / 3.1.1 Help System Multiple Vulnerabilities
  3777. EXCLUSIVE: Hacked ABC website likely breached by crooks in 2011 | Risky Business
  3778. Secure Development: Must-Do Or Money Pit?
  3779. Hot security skills of 2013 - PC Advisor
  3780. Yahoo Mail Users Still Getting Hacked Despite Vulnerability Fixes : The Droid Guy
  3781. Security cameras continue to pose snooping risk - IT News from V3.co.uk
  3782. Al Qaeda Document on Avoiding Drone Strikes
  3783. D-Link fixes router vulnerabilities very quietly
  3784. Tenable Network Security Named as SC Magazine's 2013 Excellence Award Winner for Best Enterprise Security Solution
  3785. Tenable Network Security Selects Ingram Micro as U.S. Distribution Partner
  3786. Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow (SCADA)
  3787. Ecava IntegraXor Server Login Attempt (SCADA)
  3788. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1)
  3789. Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilites
  3790. Apache 2.4 < 2.4.4 Multiple Cross-Site Scripting Vulnerabilites
  3791. Windows Update Detection
  3792. Detection of User Login
  3793. Flash Player <= 10.3.183.63 / 11.6.602.168 Multiple Vulnerabilities (APSB13-08)
  3794. TWiki < 5.1.4 MAKETEXT Variable Tilde Character Command Injection
  3795. Bugzilla < 3.6.13 / 4.0.10 / 4.2.5 / 4.4rc2 Multiple Vulnerabilities
  3796. Bugzilla show_bug.cgi id Parameter XSS
  3797. Apache 2.4 < 2.4.4 Multiple Cross-Site Scripting Vulnerabilities
  3798. WordPress Poll Plugin poll_id Parameter SQL Injection
  3799. WP Symposium Plugin for WordPress symposium_groups_functions.php gid Parameter SQL Injection
  3800. Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities
  3801. Buffalo LinkStation Detection
  3802. Buffalo LinkStation Direct Request Remote File Disclosure
  3803. Flash Player <= 10.3.183.63 / 11.6.602.168 Multiple Vulnerabilities (APSB13-08)
  3804. Flash Player for Mac <= 10.3.183.61 / 11.6.602.167 Multiple Vulnerabilities (APSB13-08)
  3805. MS KB2819372: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3806. VMware Fusion 4.1 < 4.1.4 / 5.0 < 5.0.2 VMCI Privilege Escalation (VMSA-2013-0002)
  3807. VMware View 4.x < 4.6.2 / 5.x < 5.1.2 VMCI Privilege Escalation (VMSA-2013-0002)
  3808. VMware Workstation 8.x < 8.0.5 / 9.x < 9.0.1 VMCI Privilege Escalation (VMSA-2013-0002)
  3809. SSHD libkeyutils Backdoor
  3810. MoinMoin < 1.9.6 Multiple Vulnerabilities
  3811. MoinMoin rsslink() Function page_name Parameter XSS
  3812. MariaDB 5.1 < 5.1.67 Multiple Vulnerabilities
  3813. MariaDB 5.2 < 5.2.14 Multiple Vulnerabilities
  3814. MariaDB 5.3 < 5.3.12 Multiple Vulnerabilities
  3815. MariaDB 5.5 < 5.5.29 Multiple Vulnerabilities
  3816. MyBB < 1.6.9 Multiple Vulnerabilities
  3817. Nuance PDF Reader Installed
  3818. Nuance PDF Viewer Plus Installed
  3819. Drupal 7.x < 7.20 On-Demand Image Derivative Generation Handling Resource Exhaustion DoS
  3820. W3 Total Cache Plugin for WordPress Cache File Direct Request Information Disclosure
  3821. A Vulnerability Disclosure Game Changer - Dark Reading
  3822. Banged-up Brit hacker hacks into his OWN PRISON'S MAINFRAME
  3823. Sinkholes reveal more Chinese-hacked biz - and piggybacking crims The Register
  3824. Latest Java Zero-Day Shares Connections with Bit9 Security Incident | Symantec Connect Community
  3825. HTML5 Web Storage loophole can be abused to fill hard disks with junk data
  3826. How I Hacked Facebook OAuth To Get Full Permission On Any Facebook Account (Without App "Allow" Interaction) | Nir Goldshlager Web Application Security Blog
  3827. ISC Diary | SSHD rootkit in the wild
  3828. 2 More Java Zero-Day Vulnerabilities Emerge
  3829. RSA: Lawyers eschew "self-defence" hacking - IT News from V3.co.uk
  3830. Black hat greed reducing software vulnerability report rate
  3831. Vint Cerf: 'The internet of things needs to be locked down'
  3832. Why Patching Your Software Matters!
  3833. Anonymous leaks 'Bank of America secrets' in spy revenge hack The Register
  3834. PostgreSQL 8.3 < 8.3.23 / 8.4 < 8.4.16 / 9.0 < 9.0.12 / 9.1 < 9.1.8 / 9.2 < 9.2.3 Denial of Service
  3835. Pidgin < 2.10.7 Multiple Vulnerabilities
  3836. Siemens SIMATIC RF-MANAGER Detection
  3837. Siemens SIMATIC RF-MANAGER KeyHelp.ocx Buffer Overflow
  3838. Prizm Content Connect default.aspx document Parameter Remote File Inclusion
  3839. ImpressPages cm_group Parameter Remote PHP Code Execution
  3840. Malicious Process Detection: APT1 Software Running
  3841. APT1-Related SSL Certificate Detected
  3842. Adobe ColdFusion Authentication Bypass (APSB13-03)
  3843. Nagios XI 2011R1.9 Multiple SQL Injection Vulnerabilities
  3844. Mac OS X : Java for Mac OS X 10.6 Update 13
  3845. Mac OS X : Java for OS X 2013-001
  3846. EMC Data Protection Advisor CXML Service Detection
  3847. EMC Data Protection Advisor Web UI Detection
  3848. EMC Data Protection Advisor Web UI Directory Traversal
  3849. Oracle Application Express (Apex) Detection
  3850. Oracle Application Express (Apex) Version Detection
  3851. Oracle Application Express (Apex) Administration Interface is Accessible
  3852. Oracle Application Express (Apex) CVE-2008-4005
  3853. Oracle Application Express (Apex) CVE-2009-0981
  3854. Oracle Application Express (Apex) CVE-2009-1993
  3855. Oracle Application Express (Apex) CVE-2010-0892
  3856. Oracle Application Express (Apex) CVE-2010-0076
  3857. Oracle Application Express (Apex) CVE-2011-3525
  3858. Oracle Application Express (Apex) CVE-2012-1708
  3859. Oracle Application Express (Apex) Unspecified Issues (pre 2.2.1)
  3860. Oracle Application Express (Apex) Unspecified Issues (pre 3.0.1)
  3861. Oracle Application Express (Apex) Unspecified Issues (pre 3.1)
  3862. Asterisk Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)
  3863. Firefox ESR 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3864. Firefox 18.x Multiple Vulnerabilities (Mac OS X)
  3865. Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3866. Thunderbird ESR 17.x < 17.0.3 Multiple Vulnerabilities (Mac OS X)
  3867. Firefox ESR 17.x < 17.0.3 Multiple Vulnerabilities
  3868. Firefox 18.x Multiple Vulnerabilities
  3869. Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities
  3870. Mozilla Thunderbird ESR 17.x < 17.0.3 Multiple Vulnerabilities
  3871. SeaMonkey 2.15.x Multiple Vulnerabilities
  3872. Microsoft SQL Server Unsupported Version Detection
  3873. Adobe Acrobat < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07)
  3874. Adobe Reader < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07)
  3875. Adobe Reader < 11.0.2 / 10.1.6 / 9.5.4 Multiple Vulnerabilities (APSB13-07) (Mac OS X)
  3876. Malicious Process Detection: Malware Signed By Stolen Bit9 Certificate
  3877. Cisco Prime LAN Management Solution Web Detection
  3878. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1)
  3879. VMSA-2013-0003 : VMware vCenter Server, ESXi and ESX address an NFC Protocol memory corruption and third party library security issues.
  3880. Google Chrome < 25.0.1364.97 Multiple Vulnerabilities
  3881. Terminal Services Use SSL/TLS
  3882. Oracle Java SE Multiple Vulnerabilities (Feb 2012 CPU) (Unix)
  3883. Oracle Java SE Multiple Vulnerabilities (June 2012 CPU) (Unix)
  3884. Oracle Java SE Multiple Vulnerabilities (October 2012 CPU) (Unix)
  3885. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU) (Unix)
  3886. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU Update 1) (Unix)
  3887. Symantec Encryption Desktop Detection
  3888. Symantec Encryption Desktop Local Access Elevation of Privilege Vulnerabilities
  3889. Siemens SIMATIC RF-MANAGER Detection (SCADA)
  3890. Asterisk Peer Multiple Vulnerabilities (AST-2012-014 / AST-2012-015)
  3891. Mozilla Firefox 18.x <= 18 Multiple Vulnerabilities
  3892. Mozilla Thunderbird 17.x < 17.0.3 Multiple Vulnerabilities
  3893. Google Chrome < 25.0.1364.97 Multiple Vulnerabilities
  3894. SeaMonkey < 2.16 Multiple Vulnerabilities
  3895. mDNS Client Queries
  3896. MAC change detection (SNMP)
  3897. Nessus Configuration & Compliance Auditing
  3898. Tenable Network Security Receives 5-Star Rating from SC Magazine
  3899. More Wi-Fi devices with security holes
  3900. Attribution Delivers Questionable Security Value
  3901. VMware promises better security, considers scheduled patches
  3902. Rid yourself of Adobe: New Firefox 19.0 gets JAVASCRIPT PDF viewer
  3903. Twitter's Response To The Burger King Hacking: Do A Better Job At Protecting Your Password
  3904. BlackBerry warns of TIFF vulnerability that could allow malware to run on enterprise servers
  3905. Frosty attack on Android encryption
  3906. Security experts say zombie TV warning exposes flaws
  3907. Linux, Windows, and security FUD
  3908. MantisBT 1.2.x < 1.2.13 Multiple Vulnerabilities
  3909. MantisBT < 1.2.12 Multiple Vulnerabilities
  3910. Cisco ASA 5500 Series SSH Timeout DoS
  3911. Gallery Plugin for WordPress load Parameter Remote File Inclusion
  3912. php-Charts url.php Remote PHP Code Execution
  3913. VMware vSphere Client Memory Corruption (VMSA-2013-0001)
  3914. IBM Tivoli Storage Manager Client 6.3 < 6.3.1.0 / 6.4 < 6.4.0.1 Unauthorized Access
  3915. IBM Tivoli Storage Manager Client Denial of Service
  3916. MS13-009: Security Update for Internet Explorer (2792100)
  3917. MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2797052)
  3918. MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution (2780091)
  3919. MS13-013: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution (2784242)
  3920. MS13-014: Vulnerability in NFS Server Could Allow Denial of Service (2790978)
  3921. MS13-015: Vulnerability in .NET Framework Could Allow Elevation of Privilege (2800277)
  3922. MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778344)
  3923. MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2799494)
  3924. MS13-018: Vulnerability in TCP/IP Could Allow Denial of Service (2790655)
  3925. MS13-019: Vulnerability in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of Privilege (2790113)
  3926. MS13-020: Vulnerability in OLE Automation Could Allow Remote Code Execution (2802968)
  3927. Netstat Connection Information
  3928. Adobe AIR 3.x <= 3.5.0.1060 Buffer Overflow (APSB13-05)
  3929. Flash Player <= 10.3.183.51 / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3930. Flash Player <= 10.3.183.51 / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3931. Adobe AIR for Mac 3.x <= 3.5.0.1060 Multiple Vulnerabilities (APSB13-05)
  3932. MS KB2805940: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  3933. MS13-012: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2809279)
  3934. OpenSSL 1.0.1 < 1.0.1e Information Disclosure
  3935. Shockwave Player <= 12.0.0.112 Multiple Vulnerabilities (APSB13-06)
  3936. Ecava IntegraXor < 4.00.4283 ActiveX Remote Buffer Overflow
  3937. HP LeftHand Virtual SAN Appliance < 10.0 hydra Service Multiple Remote Code Execution Vulnerabilities (version check)
  3938. Joomla! 2.5.x < 2.5.9 / 3.0.x < 3.0.3 Multiple Information Disclosure Vulnerabilities
  3939. VMSA-2013-0001 : VMware vSphere security updates for the authentication service and third party libraries
  3940. VMSA-2013-0002 : VMware ESX, Workstation, Fusion, and View VMCI privilege escalation vulnerability
  3941. Adobe Acrobat <= 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSA13-02)
  3942. Adobe Reader <= 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSA13-02)
  3943. Consumers support a federal cybersecurity policy, survey says
  3944. Americans Willing to Spend More to Thwart Cyber Attacks: Survey
  3945. Flash Player <= 10.3.183.51 / 11.5.502.149 Multiple Vulnerabilities (APSB13-05)
  3946. Flash Player <= 10.3.183.50 / 11.5.502.146 Multiple Vulnerabilities (APSB13-04)
  3947. 10 ways to reduce security headaches in a BYOD world
  3948. Document Metadata Cleaner strips personally identifiable metadata from your files
  3949. Unlocking Ma Bell: How Phone Phreaks Came To Be
  3950. It's Now Illegal to Unlock Your Cellphone - ABC News
  3951. Bizarre Google search bug benefits porn websites | Naked Security
  3952. Hacked US TV Channels report zombie apocalypse has begun
  3953. Two Jokers Social Engineer their way into the Superbowl
  3954. IOActive Labs Research: The Anatomy of Unsecure Configuration: Reality Bites
  3955. One in three PCs are infected with malware
  3956. Bit9 hacked after it forgot to install ITS OWN security product
  3957. 'Let anyone be administrator' bug in VMware snapped shut
  3958. Tenable Network Security: Windows Server 2012 Best Practice Audit...
  3959. Patch management in a world of IPv6 IT resources
  3960. Windows OS Version Information
  3961. Email Attachment Detection (client)
  3962. Barracuda Networks device detection
  3963. Barracuda Spam Firewall version detection
  3964. Oracle Java SE 7 <= Update 11 Multiple Vulnerabilities (February 2013 CPU)
  3965. Samba 3.x < 3.5.21 / 3.6.12 and 4.x < 4.0.2 SWAT Multiple Vulnerabilities
  3966. Apple TV < 5.2 Multiple Vulnerabilities
  3967. Ekiga < 4.0.0 Invalid UTF-8 Character Connection Data Parsing DoS
  3968. Oracle Java SE Multiple Vulnerabilities (February 2013 CPU)
  3969. Samba < 3.5.21 / 3.6.12 / 4.0.2 SWAT Multiple Vulnerabilities
  3970. WordPress < 3.5.1 Multiple Vulnerabilities
  3971. WordPress xmlrpc.php pingback.ping Server-Side Request Forgery
  3972. Collector Component for Joomla! index.php File Upload Arbitrary Code Execution
  3973. Novell GroupWise Client 8.x < 8.0.3 Hot Patch 2 / 2012.x < 2012 SP1 Hot Patch 1 Multiple Vulnerabilities
  3974. Mac OS X : Java for Mac OS X 10.6 Update 12
  3975. HP Diagnostics Server Default Credentials
  3976. HP Data Protector Unsupported
  3977. Mac OS X : OS X Server < 2.2.1 Multiple Vulnerabilities
  3978. Hunt CCTV DVR.cfg Direct Request Information Disclosure
  3979. LogAnalyzer userchange.php viewid Parameter XSS
  3980. RuggedOS < 3.12.1 Web UI Multiple Security Vulnerabilities
  3981. Incapsula Component for Joomla! token Parameter Multiple XSS
  3982. UnrealIRCd Unspecified DoS
  3983. Anatomy of a bug how Mac OS X chokes if you say FILE | Naked Security
  3984. 48th Largest Prime Number Discovered
  3985. Joy of Tech: Vine
  3986. A Gift For Hackers [Video]
  3987. Federal Reserve confirms its Web site was hacked
  3988. Improve your security in four easy but rarely implemented steps
  3989. China is world's most malware-ridden nation
  3990. Critical bug threatens hospital systems
  3991. Tenable Network Security: DISA STIG Microsoft Windows 8 Audit
  3992. U.S. Navy sees 110K cyber attacks every hour: Tenable Network Securitys take on White House EO on cybersecurity
  3993. Apple iOS < 6.1 Multiple Vulnerabilities
  3994. Opera < 12.13 Multiple Vulnerabilities
  3995. Barracuda Appliances Default Credentials
  3996. GRAND Flash Album Gallery Plugin for WordPress f Parameter Traversal Arbitrary Directory Enumeration
  3997. Default Password (raspberry) for 'pi' Account
  3998. Default Password (openelec) for 'root' Account
  3999. Default Password (raspi) for 'root' Account
  4000. MySQL Protocol Remote User Enumeration
  4001. Uploader Plugin for WordPress File Upload Arbitrary Code Execution
  4002. Apple iOS < 6.1 Multiple Vulnerabilities
  4003. ViArt Shop sips_response.php DATA Parameter Request Parsing Remote Shell Command Execution
  4004. Patch Management Windows Auditing Conflicts
  4005. Patch Management Auditing Satisfied
  4006. Schneider Electric Interactive Graphical SCADA System dc.exe Unspecified Buffer Overflow
  4007. Schneider Electric Interactive Graphical SCADA System (IGSS) Unsupported Version
  4008. Opera < 12.13 Multiple Vulnerabilities
  4009. Wireshark 1.6.x < 1.6.13 Multiple Vulnerabilities
  4010. Wireshark 1.8.x < 1.8.5 Multiple Vulnerabilities
  4011. Cisco VPN Client Unsupported
  4012. Joomla! 2.5.x < 2.5.7 Multiple XSS
  4013. HP Communities - Twitter attacked - Catches, stops attack-in-progre... - Enterprise Business Community
  4014. 86,800 network printers open to the whole internet is one of them yours? | Naked Security
  4015. The Physical Security Factor With Cloud Providers
  4016. Android malware uses your PC's own mic to record you
  4017. Oracle blocks security hole with quick, hot 'n' premature Java update
  4018. Suicidal Sensors: Darpa Wants Next-Gen Spy Hardware to Literally Dissolve | Danger Room | Wired.com
  4019. VMware Management Interface - A Little Story of XSS
  4020. Hackers Hijacking Security Cameras for Malware and Spying
  4021. Web smut sites are SAFER than search engines, declares Cisco The Register
  4022. Chinese hackers break into the New York Times, steal every employees password
  4023. Kali Linux A Teaser into the Future.
  4024. Hacker 'sextorted' 350 women into stripping off after stealing embarrassing pictures
  4025. UPnP scan shows 50 million network devices open to packet attack The Register
  4026. Great Firewall architects fingered for GitHub attack The Register
  4027. Tenable Network Security: Tivoli Enterprise Manager Server and...
  4028. PSA: Dont upload your important passwords to GitHub | Ars Technica
  4029. Scripts and Picks: Command Execution on Shoretel Mobility Router
  4030. RaiderSec: Wireless "Deauth" Attack using Aireplay-ng, Python, and Scapy
  4031. Hackers drop rogue Apache modules and SSH backdoors on web servers
  4032. Anons hack Asteroids into US DoJ website in Swartz death protest
  4033. 'Cyber 9/11' may be on horizon, Homeland Security chief warns
  4034. Oracle will continue to bundle 'crapware' with Java
  4035. Avoid the Landmine That is Hacking Back
  4036. Introduction to the Nessus Vulnerability Scanner
  4037. PHP 5.3.x < 5.3.21 cuRL X.509 Certificate Domain Name Matching MiTM Weakness
  4038. PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  4039. Google Chrome < 24.0.1312.56 Multiple Vulnerabilities
  4040. MySQL Server 5.1.x < 5.1.67 Multiple Vulnerabilities
  4041. MySQL Server 5.5.x < 5.5.29 Multiple Vulnerabilities
  4042. Windows 8 App Store Access
  4043. Windows 8 App Store Download Detected
  4044. Windows 8 Tile Services Detection
  4045. Horde IMP js/compose-dimp.js XSS
  4046. MoinMoin twikidraw.py Traversal File Upload Arbitrary File Overwrite
  4047. Apache CouchDB < 1.0.4 / 1.1.2 / 1.2.1 Multiple Vulnerabilities
  4048. MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) (uncredentialed check)
  4049. Cisco ASA 1000V H.323 Inspection DoS
  4050. Google Chrome < 24.0.1312.56 Multiple Vulnerabilities
  4051. Oracle VM VirtualBox Core Subcomponent < 4.0.18 / 4.1.24 / 4.2.6 Local Issue
  4052. VMware View Agent Detection
  4053. VMware View Server Detection
  4054. VMware View Server Unsupported Version Detection
  4055. VMware View Multiple Vulnerabilities (VMSA-2012-0004)
  4056. VMware View Server Directory Traversal Vulnerability (VMSA-2012-0017)
  4057. Samsung Kies SyncService ActiveX PrepareSync() Buffer Overflow
  4058. Google Doc Embedder Plugin for WordPress File Parameter Traversal Arbitrary File Disclosure
  4059. NetIQ Privileged User Manager regclnt.dll Directory Traversal
  4060. Adobe ColdFusion Unspecified DoS (APSB12-21) (credentialed check)
  4061. Adobe ColdFusion Unspecified Sandbox Bypass (APSB12-26) (credentialed check)
  4062. Drupal 6.x < 6.28 / 7.x < 7.19 Multiple Vulnerabilities
  4063. Floating Social Media Links Plugin for WordPress wpp Parameter Remote File Inclusion
  4064. WebYaST Host Modification MiTM
  4065. Portable phpMyAdmin Plugin for WordPress wp-pma-mod Authentication Bypass
  4066. Adobe ColdFusion 10 on IIS Unspecified DoS (APSB12-25) (credentialed check)
  4067. Browser Rejector Plugin for WordPress wppath Parameter Remote File Inclusion
  4068. Forums Plugin for WordPress url Parameter Arbitrary File Disclosure
  4069. Incentives and Decision Making
  4070. Apple's Skimpy Software Update Descriptions
  4071. Backdoors Found in Barracuda Networks Gear
  4072. How LinkedIn's "Hacker-In-Residence" Transformed An Ordinary Job Into A "Dream Job"
  4073. Computer firm hires Montreal student accused of hacking them
  4074. Twitter Flaw Exposes Direct Messages To Third-Party Applications
  4075. Exploiting printers via Jetdirect vulnerabilities viaForensics
  4076. Is Dell looking to kill PCs with "Project Ophelia"?
  4077. Canadian Student Expelled After Finding Critical Flaw in Software Used by Colleges
  4078. What's lurking in your network? Find out by decrypting SSL
  4079. Bad parking job? Text the driver through the license plate
  4080. Linksys vuln: Cisco responds
  4081. 'End of passwords' predictions are premature - Cambridge boffin
  4082. Mozilla Firefox 17.x <= 17 Multiple Vulnerabilities
  4083. Mozilla SeaMonkey 2.x <= 2.14 Multiple Vulnerabilities
  4084. Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities
  4085. PCI Configuration Settings Report
  4086. 800-53 Configuration Auditing
  4087. DISA Control Correlation Identifier (CCI) Dashboard
  4088. PCI Configuration Settings
  4089. Firefox 10.x < 10.0.12 Multiple Vulnerabilities
  4090. Firefox 10.x < 10.0.12 Multiple Vulnerabilities (Mac OS X)
  4091. Firefox 17.x < 17.0.1 Multiple Vulnerabilities
  4092. Firefox 17.x < 17.0.1 Multiple Vulnerabilities (Mac OS X)
  4093. Firefox 17.x < 17.0.2 Multiple Vulnerabilities
  4094. Firefox 17.x < 17.0.2 Multiple Vulnerabilities (Mac OS X)
  4095. Firefox 17.x Multiple Vulnerabilities
  4096. Firefox 17.x Multiple Vulnerabilities (Mac OS X)
  4097. Mozilla Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities
  4098. Mozilla Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities
  4099. SeaMonkey 2.14.x Multiple Vulnerabilities
  4100. Thunderbird 10.x < 10.0.12 Multiple Vulnerabilities (Mac OS X)
  4101. Thunderbird 17.x < 17.0.2 Multiple Vulnerabilities (Mac OS X)
  4102. Cerberus FTP Server < 5.0.4.0 SSH DES Cipher Weakness
  4103. Cerberus FTP Server < 5.0.5.0 Cross-Site Request Forgery
  4104. Cerberus FTP Server < 5.0.6.0 Multiple XSS
  4105. Samba 4.x < 4.0.1 AD DC LDAP Directory Objects Security Bypass
  4106. Nagios Core history.cgi Multiple Parameter Buffer Overflow
  4107. MySQL 5.5 < 5.5.29 Multiple Vulnerabilities
  4108. Windows OS Partial Product Key (WMI)
  4109. Windows Product Key Retrieval
  4110. PHP 5.3.x < 5.3.21 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  4111. PHP 5.4.x < 5.4.11 cURL X.509 Certificate Domain Name Matching MiTM Weakness
  4112. Oracle Database, January 2013 Critical Patch Update
  4113. Disable Java in your browsers now | usability | security | freedom
  4114. Whistleblower sheds light on global zero day exploit market
  4115. Security Researchers Expose Bug In Medical System Used With X-ray Machines, Other Devices
  4116. Microsoft vows to improve security tools after failed evaluation
  4117. Verizon Business Security Blog Blog Archive Case Study: Pro-active Log Review Might Be A Good Idea
  4118. China Mobile Users Warned About Large Botnet Threat
  4119. US Plants Hit By USB Stick Malware Attack
  4120. Bug Bounty Packet Storm
  4121. Homeland Security still advises disabling Java, even after update
  4122. Remote zero-day hole found in Linksys routers - Networking - Technology - News - iTnews.com.au
  4123. Hackers claim new air traffic system can be hijacked RT
  4124. Juniper Junos J-Web URL Encoding Heap Buffer Overflow (PSN-2013-01-807)
  4125. Juniper Junos PIM Join Flood DoS (PSN-2013-01-808)
  4126. Oracle Java SE 7 < Update 11 Multiple Vulnerabilities
  4127. MS13-008: Security Update for Internet Explorer (2799329)
  4128. Happy Out of Cycle IE Patch Monday
  4129. AV Really dead now says security expert
  4130. All Your Base Are In an Indeterminate State - Dark Reading
  4131. Tenable Network Security: Windows and OS X SSID Reporting and...
  4132. Tracking Wireless SSIDs Using Nessus
  4133. VLC Media Player < 2.0.5 Multiple Vulnerabilities
  4134. Red Hat Satellite Server Communication Channel Detection - Server-Side
  4135. Google Chrome < 24.0.1312.52 Multiple Vulnerabilities
  4136. Oracle Java SE 7 <= Update 10 Remote Code Execution
  4137. Flash Player <= 10.3.183.48 / 11.5.502.135 Buffer Overflow (APSB13-01)
  4138. NVIDIA Display Driver Service Remote Stack Buffer Overflow (credentialed check)
  4139. MS KB2796096: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  4140. Adobe Acrobat < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02)
  4141. Adobe AIR 3.x <= 3.5.0.880 Buffer Overflow (APSB13-01)
  4142. Adobe AIR for Mac 3.x <= 3.5.0.890 Buffer Overflow (APSB13-01)
  4143. Adobe Reader < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02)
  4144. Adobe Reader < 11.0.1 / 10.1.5 / 9.5.3 Multiple Vulnerabilities (APSB13-02) (Mac OS X)
  4145. Flash Player <= 10.3.183.48 / 11.5.502.135 Buffer Overflow (APSB13-01)
  4146. Flash Player for Mac <= 10.3.183.48 / 11.5.502.136 Buffer Overflow (APSB13-01)
  4147. Fun with AIX Shellcode and Metasploit
  4148. Ipad Extra Screen
  4149. Carving Station RAR Files | M-unition
  4150. What Else runs Telnets? Or, Pentesters Love Video Conferencing Units Too!, (Thu, Jan 10th)
  4151. $17,000 Linux-powered rifle brings auto-aim to the real world | Ars Technica
  4152. Does Your Company Actually Need a Security Department?
  4153. WordPress Pingback Portscanner Metasploit Module
  4154. 2012: Over and Done With.
  4155. Airing Out Security's Dirty Laundry - Dark Reading
  4156. The merger of cellular and Wi-Fi: The wireless network's future
  4157. Your friendly Huawei at CES: Complete with uniformed security
  4158. 5 tough security questions (and tips on answering them)
  4159. Kill that Java plugin now! New 0-day exploit running wild online
  4160. SSL Certificate Chain Contains Illegitimate TURKTRUST Intermediate CA
  4161. Does Your Alarm Have a Default Duress Code?
  4162. Pointless observation on snow removal and InfoSec
  4163. Biggest Problem in Computer Security | ITauditSecurity
  4164. Top email terms used by corporate fraudsters published by FBI
  4165. Researcher sidesteps Microsoft fix for IE zero-day
  4166. Silent Skype calls can hide secret messages
  4167. Why Hackers Are So Much Funnier Than You Are
  4168. Flash Player <= 10.3.183.43 / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  4169. iPhone App Install Detected
  4170. Opera < 12.12 Multiple Vulnerabilities
  4171. Netsuite Client Detection
  4172. Instagram Upload Activity Detected
  4173. Real Networks RealPlayer < 16.0.0.282 Multiple Vulnerabilities
  4174. Flash Player <= 10.3.183.29 / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4175. MySQL Server 5.1 < 5.1.63 Multiple Vulnerabilities
  4176. Squid 2.x / 3.x < 3.1.22 / 3.2.4 / 3.3.0.2 cachemgr.cgi DoS
  4177. Advanced Custom Fields Plugin for WordPress acf_abspath Parameter Remote File Inclusion
  4178. Citrix XenDesktop Virtual Desktop Agent USB Redirection Propagation Handling Access Restriction Bypass (CTX135813)
  4179. Drupal 6.x < 6.27 / 7.x < 7.18 Multiple Vulnerabilities
  4180. IBM Rational ClearQuest 7.1.x < 7.1.2.9 Multiple Vulnerabilities (credentialed check)
  4181. VMSA-2012-0018 : VMware security updates for vCSA and ESXi
  4182. Snare Agent for Linux > 1.7.0 / 2.0.0 Multiple Vulnerabilities
  4183. Novell iPrint Client < 5.82 Remote Code Execution
  4184. Novell eDirectory 8.8.x Multiple Security Vulnerabilities
  4185. Citrix XenApp XML Service Interface Crafted Packet Parsing Remote Code Execution (CTX135066)
  4186. Mac OS X Wireless Networks List
  4187. PostgreSQL 8.3 < 8.3.18 Multiple Vulnerabilities
  4188. MS KB2794220: Vulnerability in Internet Explorer Could Allow Remote Code Execution
  4189. MS KB2798897: Unauthorized Digital Certificates Could Allow Spoofing
  4190. VLC < 2.0.5 Multiple Vulnerabilities
  4191. Zero day holes found in popular online games | HITBSecNews
  4192. Ban on demanding Facebook passwords among new 2013 state laws | Reuters
  4193. Security flaw found in app used for 'safe sexting'
  4194. NYC mayor pins crime rate spike on iPhone, iPad theft The Register
  4195. Hacker at Public Works went unnoticed for days, documents show | canada.com
  4196. Facebook Patches Webcam Vulnerability After Receiving Hacker Tip - Bloomberg
  4197. Best Book Bejtlich Read in 2012
  4198. Microsoft Rushes Out Fix It For Internet Explorer 0-day Exploit
  4199. Security Researcher Compromises Cisco VoIP Phones With Vulnerability - Dark Reading
  4200. c0decstuff: Defeating Windows 8 ROP Mitigation
  4201. Metasploit: 5 Tips to Ensure Safe Penetration T... | SecurityStreet
  4202. Celebrity hacker gets ten years
  4203. HTTPS Everywhere for Internet Explorer
  4204. Naked Scarlett Johansson pic snatch bloke gets 10 YEARS The Register
  4205. Apple addresses another Wi-Fi bug with iOS 6.0.2 update
  4206. Adobe to patch 2-year-old Shockwave vulnerability next year
  4207. Top 10 gadgets for Christmas 2012- The Inquirer
  4208. Making Database Security Your No. 1 2013 Resolution
  4209. VMware patches 'critical' vulnerability
  4210. Top 12 IT Security Stories of 2012
  4211. Abusing SAP Servers - SpiderLabs Anterior
  4212. Soldier of Fortran IBM Mainframe User Enumeration and Bruteforcing
  4213. Security and Networking - Blog - Should We Exploit Every Vulnerability to Prove itExist?
  4214. Shoulder Surfing The Friendly Skies | CSO Blogs
  4215. Tenable Network Security: New CIS MySQL 4.1/5.1 Audit Policies
  4216. Google Chrome < 23.0.1271.97 Multiple Vulnerabilities
  4217. MS12-077: Cumulative Security Update for Internet Explorer (2761465)
  4218. Google Chrome < 23.0.1271.97 Multiple Vulnerabilities
  4219. MS KB2785605: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10
  4220. MS12-078: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2783534)
  4221. MS12-079: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642)
  4222. MS12-080: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2784126)
  4223. MS12-081: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2758857)
  4224. MS12-082: Vulnerability in DirectPlay Could Allow Remote Code Execution (2770660)
  4225. MS12-083: Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)
  4226. Adobe AIR 3.x <= 3.5.0.600 Multiple Vulnerabilities (APSB12-27)
  4227. Flash Player <= 10.3.183.43 / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  4228. Adobe AIR for Mac 3.x <= 3.5.0.600 Multiple Vulnerabilities (APSB12-27)
  4229. Ektron CMS XslCompiledTransform Class Request Parsing Remote Code Execution
  4230. Flash Player for Mac <= 10.3.183.43 / 11.5.502.110 Multiple Vulnerabilities (APSB12-27)
  4231. HP Intelligent Management Center User Access Manager Datagram Parsing Code Execution
  4232. IBM Lotus Symphony < 3.0.1 Fix Pack 2 Multiple Vulnerabilities
  4233. MarkAny Content SAFER ActiveX Arbitrary Download and Execution
  4234. MediaWiki < 1.18.6 / 1.19.3 / 1.20.1 Multiple Vulnerabilities
  4235. Cisco Wireless LAN Controller Flaw Permits Cross-Site Request Forgery Attacks
  4236. Hacker nabs Yahoo! site backups
  4237. Samsung devices vulnerable to dangerous Android exploit
  4238. WOW! Paypal Sends Me 5000$ For A Command Execution Vulnerability | Learn How To Hack - Ethical Hacking and security tips
  4239. No, Executing Offensive Actions Against Our Adversaries Really Does Have High Risk (Deal With It)
  4240. Lock maker starts to pay for hackable lock fixes
  4241. Botnet hidden in the Tor network
  4242. My 5 Top Ways to Escalate Privileges
  4243. Offensive security for dummies
  4244. Top Mobile Vulnerabilities And Exploits Of 2012
  4245. Samsung's Smart TVs Wide Open To Exploits
  4246. 10 Security Stories That Shaped 2012
  4247. Hacking bazaar ExploitHub gets hacked, database leaked
  4248. NetIQ Privileged User Manager ldapagnt_eval() Function Remote Code Execution
  4249. NetIQ Privileged User Manager Password Change Authentication Bypass
  4250. ISC BIND 9 DNS64 Handling DoS
  4251. Microsoft Windows Unquoted Service Path Enumeration
  4252. But did she STEAL the iPhone? App takes photo of woman trying to unlock it
  4253. Amazon.com: The Personal Internet Address & Password Log Book (9781441303257): Peter Pauper Press: Books
  4254. Rethinking the Computer at 80 - NYTimes.com
  4255. Proxmark 3, now with more Android - SpiderLabs Anterior
  4256. Ira Winkler: Stupid users, or stupid infosec?
  4257. No password is safe from this new 25-GPU computer cluster
  4258. GhostShell hackers release 1.6 million NASA, FBI, ESA accounts
  4259. freeFTPd / freeSSHd SFTP Authentication Bypass
  4260. iPhone Thief Photographs Herself Using Stolen Phone
  4261. Tenable Network Security: New CIS VMware ESX Audit Policy
  4262. Tenable Network Security: New CIS SQL Server 2008 R2 Audit...
  4263. Apache Tomcat 7.0.x < 7.0.32 CSRF Filter Bypass
  4264. RWCards Component for Joomla! mosConfig_absolute_path Parameter Remote File Inclusion
  4265. FreeSWITCH Route Header Value Handling DoS
  4266. ManageEngine Security Manager Plus 'f' Directory Traversal Arbitrary File Access
  4267. Carnal0wnage & Attack Research Blog: On Sophistication
  4268. Why is outcome based security monitoring so critical with Big Data?
  4269. Tectia SSH Server Authentication Bypass
  4270. DHCPv6 server detection
  4271. DHCPv6 client detection
  4272. Direct Attack Path Analysis
  4273. Email hacks router - The H Security: News and Features
  4274. US woman arrested for bank robbery brags on YouTube about robbing a bank
  4275. Forget Disclosure Hackers Should Keep Security Holes to Themselves | Wired Opinion | Wired.com
  4276. DARPA Looks For Backdoors, Malware In Tech Products
  4277. Rumble in the Tumblr: Troll-worm infected thousands of blogs
  4278. FreeSSHD Remote Authentication Bypass
  4279. Simple Nomad Locates John McAfee Through Smartphone Photo
  4280. Buffalo Linkstation Privilege Escalation
  4281. cPanel Unspecified Flaws Have Unspecified Impact - SecurityTracker
  4282. Microsoft Windows Mounted Devices
  4283. NEOHAPSIS - Peace of Mind Through Integrity and Insight
  4284. Belkin wireless routers weak key
  4285. The Hackback Debate | Steptoe Cyberblog
  4286. Prince William photos accidentally reveal RAF password | Naked Security
  4287. Backdoor found in Piwik analytics software - Update - The H Security: News and Features
  4288. Yahoo XSS exploits going for $700
  4289. ENISA promotes digital hacker traps
  4290. Mobile browser vulnerability lets hackers steal cloud computing time
  4291. Top 5 Security Predictions for 2013 from ISF
  4292. Geek Researcher Spends Three Years Living With Hackers
  4293. US software firm hacked for years after suing China
  4294. US-CERT: Samsung Printer Firmware Contains Backdoor
  4295. IBM Rational Developer for System z Discloses SSL Certificate Password to Local Users
  4296. Symantec Mail Security Autonomy Verity Keyview Filter Vulnerabilities (SYM12-018)
  4297. Symantec Messaging Gateway 9.5.x Multiple Vulnerabilities (SYM12-018)
  4298. RT < 3.8.15 / 4.0.8 Multiple Vulnerabilities
  4299. Wordfence Plugin for WordPress email Parameter XSS
  4300. Google Chrome < 23.0.1271.91 Multiple Vulnerabilities
  4301. VMware vCenter Data Collection
  4302. VMware vCenter SOAP API Settings
  4303. IrfanView < 4.35 Multiple Heap-Based Buffer Overflows
  4304. Samsung printers contain hidden, hard-coded management account
  4305. Antivirus software a waste of money for businesses, report suggests
  4306. The cybersecurity needs of the borderless enterprise
  4307. Thanksgiving SCADA Bug Hunt
  4308. What you don't know about passwords might hurt you
  4309. Hotel blames burglaries on hacked Onity card locks
  4310. Exploitable Systems Report
  4311. Opera < 12.11 Multiple Vulnerabilities
  4312. Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service
  4313. Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple Security Weaknesses
  4314. Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities
  4315. IOServer XML Server URI Directory Traversal Arbitrary File Access
  4316. Novell Sentinel Log Manager Web Detection
  4317. Novell Sentinel Log Manager Authentication Bypass
  4318. SSL Certificate Signed with the Compromised Fortigate Key
  4319. Bugzilla < 3.6.12 / 4.0.9 / 4.2.4 / 4.4rc1 Multiple Vulnerabilities
  4320. Dell OpenManage Server Administrator omalogin.html DOM-based XSS
  4321. IBM WebSphere Application Server 8.5 < Fix Pack 1 Multiple Vulnerabilities
  4322. Wing FTP Server Multiple ZIP Commands Parsing Remote DoS
  4323. Novell File Reporter Agent FSFUI UICMD 126 Arbitrary File Download
  4324. Opera < 12.11 Multiple Vulnerabilities
  4325. Apache Tomcat 7.0.x < 7.0.28 Header Parsing Remote Denial of Service
  4326. Apache Tomcat 5.5.x < 5.5.36 DIGEST Authentication Multiple Security Weaknesses
  4327. Apache Tomcat 6.0.x < 6.0.36 Multiple Vulnerabilities
  4328. Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple Security Weaknesses
  4329. NetIQ Privileged User Manager Default Admin Password
  4330. NetIQ Privileged User Manager Password Change Authentication Bypass
  4331. NetIQ Privileged User Manager ldapagnt_eval() Function Remote Code Execution
  4332. Firefox 10.x < 10.0.11 Multiple Vulnerabilities (Mac OS X)
  4333. Firefox 16.x Multiple Vulnerabilities (Mac OS X)
  4334. Thunderbird 10.x < 10.0.11 Multiple Vulnerabilities (Mac OS X)
  4335. Thunderbird 16.x Multiple Vulnerabilities (Mac OS X)
  4336. Firefox 10.x < 10.0.11 Multiple Vulnerabilities
  4337. Firefox 16.x Multiple Vulnerabilities
  4338. Mozilla Thunderbird 10.x < 10.0.11 Multiple Vulnerabilities
  4339. Mozilla Thunderbird 16.x Multiple Vulnerabilities
  4340. SeaMonkey 2.13.x Multiple Vulnerabilities
  4341. Proxying 3G iPhone Data
  4342. Report: Apple's AuthenTec sells embedded security division - The H Security: News and Features
  4343. New 64-bit Linux Rootkit Doing iFrame Injections
  4344. Children should be at least 13 years old to use Internet: Poll - Computer Business Review
  4345. Researchers warn of 'Cool' exploit platform - IT News from V3.co.uk
  4346. Malware Made Which Can Share A Smartcard Over The Internet
  4347. Facebook to roll out HTTPS by default to all users
  4348. Hackers break into FreeBSD with stolen SSH key
  4349. The convergence of biological and computer viruses | TechRepublic
  4350. HoneyDrive Honeypots In A Box
  4351. Hardcoded passwords leave Telstra routers wide open - Networks - SC Magazine Australia - Secure Business Intelligence
  4352. Obama signs secret directive to help thwart cyberattacks - The Washington Post
  4353. Technical Support - Welcome to Huawei.com
  4354. ircmaxell's blog: Anatomy of an Attack: How I Hacked StackOverflow
  4355. HTTP Pass the Hash with Python Neohapsis Labs
  4356. VMInjector - DLL Injection tool to unlock guest VMs | SECFORCE :: Blog
  4357. Owning Computers Without Shell Access | Accuvant
  4358. Rebootuser VulnVoIP (Vulnerable VoIP) The Fundamentals of VoIP Hacking
  4359. 6 Ways Big Data is Helping Reinvent Enterprise Security
  4360. QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)
  4361. Liferay Portal 6.1.0 / 6.1.10 Arbitrary File Deletion
  4362. MySQL 5.0.95 MyISAM Table Symbolic Link Local Restriction Bypass
  4363. Symantec Legacy Decomposer Code Execution (SYM12-017)
  4364. VMSA-2012-0016 : VMware security updates for vSphere API and ESX Service Console
  4365. CoSoSys Endpoint Protector 4 Predictable Password
  4366. Freestyle Support Portal Component for Joomla! prodid Parameter SQL Injection
  4367. Freestyle Testimonials Component for Joomla! Unspecified SQL Injection
  4368. MS12-073: Vulnerabilities in Microsoft IIS Could Allow Information Disclosure (2733829) (uncredentialed check)
  4369. WebSphere MQ 6.x < 6.0.2.9 / 7.x < 7.0.1.1 'userid' and 'password' Information Disclosure
  4370. EMC NetWorker Module for Microsoft Applications 2.2.x / 2.3.x < 2.3 build 122 / 2.4.x < 2.4 build 375 Multiple Vulnerabilities
  4371. Sophos Anti-Virus < 10.0.9 / 10.2.1 Multiple Vulnerabilities
  4372. Sophos Anti-Virus for Mac Multiple Vulnerabilities
  4373. Security Debt and Vulnerability Supply Chains
  4374. Awareness: Top 10 Reasons Security Awareness Efforts Fail
  4375. Tech Insight: Better Defense Through Open Source Intelligence - Dark Reading
  4376. 5 ways to avoid pulling a Petraeus
  4377. Google app bug cancels Christmas, December
  4378. Hackers obtained access to FreeBSD servers
  4379. Infamous Hacker Heading Chinese Antivirus Firm?
  4380. Hakin 9 Cross Site Scripting
  4381. How tweets about your sick cat threaten our security health | ZDNet
  4382. Twitter unintentionally resets thousands of passwords
  4383. Adobe confirms customer data breach
  4384. Cybersecurity bill fails in U.S. Senate - Computerworld
  4385. For Sale: Cheap access to corporate computers
  4386. Skype fixes e-mail security flaw
  4387. Enterprises can obtain value from red teaming exercises, expert says
  4388. NASA to deploy whole-disk encryption following breach
  4389. Tenable Network Security: Auditing Check Point GAiA Configuration...
  4390. Tenable Network Security: Auditing Juniper Junos Configuration...
  4391. Tenable Network Security: New CIS Debian Linux Audit Policy
  4392. Google Chrome < 23.0.1271.64 Multiple Vulnerabilities
  4393. Apple iOS < 6.0.1 Multiple Vulnerabilities
  4394. Tech Check for 11-12-12 on WYPR's Maryland Morning
  4395. Tenable Network Security Awarded Common Criteria Certification for Emerging Security Threats
  4396. Opera < 12.10 Multiple Vulnerabilities
  4397. Oracle Forms Recognition Multiple ActiveX Control Arbitrary File Overwrite Vulnerabilities
  4398. Adobe AIR 3.x <= 3.4.0.2710 Multiple Vulnerabilities (APSB12-24)
  4399. Flash Player <= 10.3.183.29 / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4400. Adobe AIR for Mac 3.x <= 3.4.0.2710 Multiple Vulnerabilities (APSB12-24)
  4401. Flash Player for Mac <= 10.3.183.29 / 11.4.402.287 Multiple Vulnerabilities (APSB12-24)
  4402. Google Chrome < 23.0.1271.64 Multiple Vulnerabilities
  4403. QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)
  4404. SolarWinds Orion NPM < 9.5 Login.asp Blind SQL Injection
  4405. Traq admincp/common.php authenticate() Function Authentication Bypass Remote Code Execution
  4406. Hack.me Build, Host & Share Vulnerable Web Application Code
  4407. Side-Channel Attack Steals Crypto Key from Co-Located Virtual Machines | threatpost
  4408. Apple's iOS 6.0.1 still has Wi-Fi bugs | ZDNet
  4409. ISC Diary | Cisco TACACS+ Authentication Bypass
  4410. Should the AV Industry Accept Defeat?
  4411. One in four don't clean their stinky old browsers - especially Firefoxers
  4412. Antivirus Firm Founder John McAfee Accused of Murder, Says He's Innocent
  4413. A history of hacking: Documentary captures essence of Def Con
  4414. Microsoft Updates November 2012 - IE, Kernel+Shell, and .NET Critical Patches
  4415. Most U.S. Drones Openly Broadcast Secret Video Feeds | Danger Room | Wired.com
  4416. Carnal0wnage & Attack Research Blog: The Biggest Problem in Computer Security
  4417. Microsofts security team is killing it: Not one product on Kasperskys top 10 vulnerabilities list - The Next Web
  4418. VMWare ESX Source Code Leaked On The Internet
  4419. Sophos products and Tavis Ormandy | Naked Security
  4420. Coca-Cola Was Hacked But Didnt Tell Shareholders
  4421. 1.7M mobile apps analyzed: Users tracked and put at risk, and its unjustified
  4422. Security Headers on the Top 1,000,000 Websites
  4423. Users take their time over Java and Flash updates
  4424. Network Encryption Anomalies
  4425. BigFix Client Patch Update
  4426. Mozilla SeaMonkey 2.13.x < 2.13.2 Multiple Vulnerabilities
  4427. Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities
  4428. ZABBIX Web Interface popup_bitem.php itemid Parameter SQL Injection
  4429. Temenos T24 Detection
  4430. ManageEngine OpStor Default Administrator Credentials
  4431. ManageEngine OpStor availability730.do days Parameter XSS
  4432. ManageEngine SupportCenter Plus HomePage.do fromCustomer Parameter XSS
  4433. CoDeSys PLC Runtime Service Detection
  4434. CoDeSys Authentication Bypass Directory Traversal
  4435. CoDeSys Unauthenticated Command-line Access
  4436. Oracle VM VirtualBox 3.x / 4.0.x < 4.0.10 Local Integer Overflows
  4437. Kaspersky Password Manager 5.x < 5.0.0.169 HTML Injection
  4438. Mac OS X : OS X Server < 2.1.1 Multiple Vulnerabilities
  4439. Mac OS X : Safari < 6.0.2 Multiple Vulnerabilities
  4440. Apple iOS < 6.0.1 Multiple Vulnerabilities
  4441. CA ARCserve Backup Multiple Vulnerabilities (CA20121018) (credentialed check)
  4442. Symphony CMS Password Retrieval Script XSS
  4443. Hacking an old radar gun to interface with a laptop
  4444. Burp proxy opens Android SSL connections
  4445. Angry White Guy
  4446. Five pieces of advice for those new to the infosec industry
  4447. Halloween Tech Monsters Core Security
  4448. The Script Kiddie 5-step program
  4449. Stealing Your Neighbors Keys with a Drinking Glass
  4450. Moving to a career in IT security | Computerworld Blogs
  4451. Companies Should Think About Hacking Back Legally, Attorney Says
  4452. Huawei reaches out to critical German hacker over router flaws
  4453. Windows 8 'penetrated' says firm which sells to world's spy agencies
  4454. Research Shows Serious Problems With Android App SSL Implementations | threatpost
  4455. Security Flaws in the TSA Pre-Check System and the Boarding Pass Check System. Puckinflight
  4456. Open Security Research: Hacking KeyLoggers
  4457. Windows 8 security overview Safest Windows ever? | Naked Security
  4458. Microsoft's picture-password ad: Intriguing or confusing? | Technically Incorrect - CNET News
  4459. Your mouse may actually be a RAT in disguise
  4460. Malware hides behind the mouse
  4461. Drupal 7.x < 7.16 Multiple Vulnerabilities
  4462. Adobe Software Signed By Revoked Certificate (APSA12-01)
  4463. IPSEC Internet Key Exchange (IKE) Version 2 Detection
  4464. Internet Key Exchange (IKE) Aggressive Mode with Pre-Shared Key
  4465. Novell ZENworks Asset Management rtrlet Component GetFile_Password Method Hardcoded Credentials Information Disclosure
  4466. Juniper Junos web-authentication Policy Not Enforced (PSN-2012-10-735)
  4467. Mutiny < 4.5-1.12 Unspecified Network Interface Menu Remote Command Injection
  4468. Symantec Ghost Solution Suite Backup File Handling Memory Corruption (SYM12-016)
  4469. Exim 4.70 - 4.80 DKIM DNS Record Parsing Remote Buffer Overflow
  4470. WANem index-advanced.php XSS
  4471. IBM Rational ClearQuest Multiple Script Information Disclosure
  4472. WANem result.php pc Parameter Remote Command Execution
  4473. Mozilla Thunderbird 16.x < 16.0.2 Multiple Vulnerabilities
  4474. Firefox 16.x < 16.0.2 Multiple Vulnerabilities
  4475. Hack3rcon 3 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)
  4476. Big security on a shoe-string budget
  4477. IP theft attacks can hide on networks for years, unspotted by corporate victims, report claims
  4478. 10 steps for writing a secure BYOD policy
  4479. 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions - SecurityTracker
  4480. Hackers Steal Customer Data From Barnes And Noble Keypads
  4481. Boeing zaps PCs using CHAMP missile microwave attacks
  4482. Five Habits of Companies That Catch Insiders
  4483. Apple banishes Java from Mac browsers
  4484. Android apps get SSL wrong, expose personal data
  4485. 5 to-dos to maintain reputation after cyberattack | ZDNet
  4486. Lack of skilled security pros challenges CISOs to fill specialties
  4487. Tenable Network Security: New DISA STIG MS Office 2010 Audit...
  4488. The key to campus network security: Better risk management
  4489. Mozilla Firefox 15.x <= 15 Multiple Vulnerabilities
  4490. Mozilla SeaMonkey 2.x < 2.13 Multiple Vulnerabilities
  4491. Mozilla Thunderbird 15.x <= 15 Multiple Vulnerabilities
  4492. BigFix Server Detection
  4493. MySQL Server 5.5.x <= 5.5.27 / 5.1.x <= 5.1.65 Multiple Unspecified Vulnerabilities
  4494. Patch Management: Tivoli Endpoint Manager Report
  4495. SSL Compression Methods Supported
  4496. TLS Next Protocols Supported
  4497. RuggedCom Known Hardcoded SSL RSA Private Key
  4498. ISC BIND 9 DNS RDATA Handling DoS
  4499. TLS CRIME Vulnerability
  4500. Firefox 16.x < 16.0.1 Multiple Vulnerabilities
  4501. Mozilla Thunderbird 16.x < 16.0.1 Multiple Vulnerabilities
  4502. SeaMonkey 2.13.x < 2.13.1 Multiple Vulnerabilities
  4503. Oracle Java SE Multiple Vulnerabilities (October 2012 CPU)
  4504. Mac OS X : Java for Mac OS X 10.6 Update 11
  4505. MySQL 5.5 < 5.5.28 Multiple Vulnerabilities
  4506. Pass the Hash w/o Metasploit - Part2 - Blog - Room362.com
  4507. Week 42 in Review 2012
  4508. Incident Response in 3.08 MB
  4509. National Weather Service Hacked
  4510. The Importance of Security Awareness
  4511. Zero-day attacks last much longer than most would believe
  4512. Pacemaker hacker says worm could possibly 'commit mass murder' | Computerworld Blogs
  4513. Infographic: Top password mistakes - Computerworld
  4514. Don't secure the internet, it needs crime: Diffie | ZDNet
  4515. Web app design at the core of coding weaknesses, attacks, says expert
  4516. Public Wi-Fi hotspots pose real threat to enterprises, survey finds
  4517. Tenable Network Security: New CIS Apache Web Server 2.2 Audit...
  4518. Tenable Network Security: New CIS Solaris 11 Audit Policy
  4519. Tenable Network Security: Tenable Audit Policies - CIS Unix and...
  4520. IEC 60870-5-104 server detection
  4521. Flash Player <= 11.4.402.278 Multiple Vulnerabilities (APSB12-22)
  4522. #1 Nessus is an Enterprise Tool - Top Ten Things You Didn't Know About Nessus
  4523. Analyzing Nessus Virus Detections with the Log Correlation Engine
  4524. Analyzing Nessus Detected Malicious Processes Activity with the Log Correlation Engine
  4525. MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319)
  4526. MS12-065: Vulnerability in Microsoft Works Could Allow Remote Code Execution (2754670)
  4527. MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517)
  4528. MS12-067: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution (2742321)
  4529. MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2724197)
  4530. MS12-069: Vulnerability in Kerberos Could Allow Denial of Service (2743555)
  4531. MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege (2754849)
  4532. MS KB2661254: Update For Minimum Certificate Key Length
  4533. Adobe AIR 3.x <= 3.4.0.2540 Multiple Vulnerabilities (APSB12-22)
  4534. Flash Player <= 10.3.183.23 / 11.4.402.278 Multiple Vulnerabilities (APSB12-22)
  4535. Wireshark 1.8.x < 1.8.3 Multiple Vulnerabilities
  4536. Windows Phone7 < 7.10.8107 Out-of-Date SSL Certificate Blacklist
  4537. Former LulzSec member pleads guilty to conspiracy in Sony Pictures hack
  4538. Rise In U.S. Hacker Attacks Against China
  4539. Security Monitoring An Elixir For Intrusion Costs? - Dark Reading
  4540. Master Keys
  4541. Never Attribute to Malice, but Always Verify
  4542. Majority of SMBs Have No Security Policies or Contingency Plans
  4543. Facebook Confirms Researcher Collected Countless Phone Numbers
  4544. Security Manager's Journal: I hired a hacker - Computerworld
  4545. Exploiting a MIPS Stack Overflow | /dev/ttyS0
  4546. Apple's Combined Patching
  4547. How Your #Naked Pictures Ended Up on the Internet
  4548. The Security-Conscious Uncle
  4549. No homecoming queen vote if you don't wear RFID tag?
  4550. Hacker wins $60,000 prize for breaking into Google Chrome
  4551. Firefox 16 pulled offline following security flaw find
  4552. Mobile Brings a New Dimension to the Enterprise Risk Equation
  4553. Reporting Mistakes
  4554. James Bond's Dry Erase Marker: The Hotel PenTest Pen - SpiderLabs Anterior
  4555. HP Communities - CISO Concerns - Security vs. Usability, Affordabil... - Enterprise Business Community
  4556. Foursquare app on an Apple iOS mobile device
  4557. Slacker application music streaming leaking information
  4558. Slacker application music streaming on an Android mobile device
  4559. Slacker application music streaming on an Apple iOS mobile device
  4560. Debate: Flame, Stuxnet and other APTs are hype, but still be wary
  4561. SumatraPDF < 2.1 Multiple Vulnerabilities
  4562. Flexera ISGrid ActiveX Control Remote Code Execution Vulnerabilities
  4563. IBM WebSphere Application Server 7.0 < Fix Pack 25 Multiple Vulnerabilities
  4564. Novell GroupWise WebAccess 8.x < 8.0.3 Multiple Cross-Site Scripting Vulnerabilities
  4565. WordPress A Page Flip Book Plugin for WordPress pageflipbook_language Parameter Local File Inclusion
  4566. RSA Authentication Client 3.5 < 3.5.6 Local Authentication Bypass
  4567. Magnum MNS-6K Hardcoded Admin Account
  4568. Symantec Enterprise Vault < 10.0.2 Multiple Vulnerabilities in Oracle Outside-In Libraries (SYM12-015)
  4569. Network Monitoring As A Security Tool - Dark Reading
  4570. Bing is the most heavily poisoned search engine, study says The Register
  4571. What is Scaring Businesses the Most? Spear-phishing.
  4572. In a Zero-Day World, Its Active Attacks that Matter
  4573. Could your phone's camera be secretly taking pictures right now? Hackers can use your lens to steal private data - and build up a 3D model of your home | Mail Online
  4574. How millions of DSL modems were hacked in Brazil, to pay for Rio prostitutes | Naked Security
  4575. Tiny Evil Maid CHKDSK Utility Can Steal Passwords | threatpost
  4576. JSON Hijacking Demystified - SpiderLabs Anterior
  4577. Email Address Harvesting