[email protected] +603-2181 3666
Extol Threat Intelligent Notification

During a recent pen test of GitLab, Imperva researchers were surprised to come across a vulnerability that leaves users exposed to session hijacking attacks. The vulnerability stems from the type of session tokens used by GitLab. According to Imperva, the tokens are troublesome because: They are short, making them susceptible to brute-force attacks; they are […]

Security flaws in Facebook Messenger and Instagram let hackers propagate attacks and steal personal data. Researchers at Kaspersky Lab recently discovered cyberattacks on Instagram and Facebook Messenger intended to steal credentials and spread malware, respectively. Both instances demonstrate the potential danger when an attacker seeks power in a social network.The two attacks, while similar in […]

Google began sending out notices to site owners this month, reminding those who haven’t yet migrated from HTTP to HTTPS that in October their sites will be marked “NOT SECURE.”The warnings are directed to owners of HTTP pages that contain forms, specifically sites that include text input fields like <input type=”text”> or <input type=”email”>. The […]

Corporate information systems became more vulnerable in 2016, even as user awareness regarding information security significantly decreased. That’s the word from Positive Technologies, which found in an overview of security audit findings that critical vulnerabilities were detected in 47% of investigated corporate systems last year. During audits, experts simulate how actual attackers (external and internal) […]

What happens when cable and phone companies are left to their own devices? Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and […]

Two years ago, VMware first began talking about the concept of the “Goldilocks Zone,” where the virtualization hypervisor sits at the ideal location in the network to improve enterprise security. At the VMworld event today in Las Vegas, VMware announced that its Project Goldilocks vision is at long last becoming generally available, under the product […]

Black clouds on the internet do sometimes have a silver lining. Global attacks such as those from Mirai last year and WannaCry/NotPetya this year have fomented informal collaborative global responses — one of which happened this month when multiple competitive vendors collaborated in the research and neutralization of a major new botnet called WireX. The […]

A point of sale (POS) system from SAP is wide open—allowing anyone to go in and steal payment card data or, in a new cybercrime wrinkle, change prices on merchandise. According to ERPScan—which used the example of hacking in to change the price of a MacBook to $1—the SAP POS Xpress Server does not perform […]

All in a week’s work: According to new research from IBM X-Force, Tuesday is the biggest day for spam. It makes sense. Like any professional, spammers do their research and know Tuesday is a key day for email marketing—with 20% more opens than average, according to HubSpot. “Contrary to the stereotype, a cyber-criminal is not […]

Attackers have taken to Facebook Messenger with a combination of social engineering and malicious JavaScript to spread adware, something that’s likely earning them a small chunk of change in the process. David Jacoby, a senior security researcher with Kaspersky Lab’s Global Research & Analysis Team, said he spotted an attack he believes is part of […]

1 21 22 23 24 25 157