ICT Security Assessment -Today’s Cyber Security landscape requires the utmost attention to a set of internal macro indicators for all organisations. Maybe your organisation has an antivirus software to protect your company’s data? Or maybe you also have firewalls and encryption technology, so you think you can sit back and let the technology protect you
Swascan Vulnerability Hunting Team contacted the PSIRT at Adobe following a security monitoring activity. Swascan Team, during the security analysis for a media company in Europe, found 5 vulnerabilities related to the Web Servers at adobesandbox.com which handles through multiple and different hosts the Adobe Sandbox Service. Adobe Sandbox Adobe adopts Adobe Sandbox in order
CyberSecurity minute It is a matter of fact that we are currently living a difficult period as far as Cyber Attacks are concerned. The number of stolen records is constantly increasing. Nowadays, according to a RiskIQ report, we have a very busy CyberSecurity minute: 5.518 records leaked (as far as well-known and disclosed data breaches
A researcher discovered a security flaw (the Sprint vulnerability) in the online system of Sprint that allowed anyone to access the internal staff portal. Sprint is the fourth largest form in the USA that provides wireless and internet services. As of October 2017, the company has around 54 million active users of its services offered
For the past few days, the telecom sector seems to combat CyberSecurity issues. Reportedly, EE, a UK-based cellular firm, patched two different flaws in its system within one week. Fortunately, the vulnerabilities were discovered by some white-hat hacker before anyone could exploit them. Yet, the bugs were not trivial to be ignored. EE Patched The
Foreshadow: While the chaos for the horrifying Spectre and Meltdown is still going, researchers discover another vulnerability in Intel CPUs that is even more robust. Two different groups of researchers discovered the vulnerability named “Foreshadow” and reported it to Intel. Upon further investigations, Intel found two more related flaws, which the researchers termed as “Foreshadow-NG”.
samsam ransomware: Criminal Hackers exploit ransomware attacks as a robust money making strategy as they easily coerce the victims to pay money. Continuing with this strategy, they are now making money with the notorious SamSam malware. A latest study reveals that SamSam ransomware has raised around $6 million for Criminal hackers in ransom demands. SamSam
Web Security is a hot topic for everyone in these days. A Positive Technologies report of 2017 showed how all of the websites and web applications have at least one well-known vulnerability. The same report shows how the 70% of websites and web applications have at least one high severity vulnerability as well. As a matter of
Wi-Fi Security? It’s time. Wi-Fi Alliance launched WPA3. It will certainly ensure a higher CyberSecurity level and, as a consequence, it will benefit users both in terms of privacy and GDPR Compliance. However, WPA3 does not make wireless networks hacker proof. First of alla, let’s have a look together at the features and benefits of WPA3.
DDOS: introduction DDoS: Distributed Denial of Service. Whenver connections overload a server, there’s no more the chance to start new connections. This situation takes place when a lot of compromised systems send at the same time data traffic to the target system, causing its crash. Such an overload could make a server, a website or an online
DOS: introduction DoS stands for “Denial of Service” and this term, in the CyberSecurity field, specifies a failure due to an illegal attack. The resources of an IT system run out because of the just mentioned attack, this leads to the impossibility from the system side to erogate the service to the clients who require it. The
IP address: introduction You can visualize the IP address or “internet protocol address” in the graphic interface as a numerical label. It allows to univocally identify a host (which is a physical device such as a computer, a printer, a router or a smartphone). The host is connected to a network that uses the internet