[email protected] +603-2181 3666
Extol Threat Intelligent Notification

While most Americans were enjoying the Labor Day weekend, Linux creator Linus Torvalds was busy releasing the Linux 4.13 kernel on Sept. 3. Linux 4.13 is the fourth new Linux kernel released in 2017 and follows Linux 4.12, which debuted in July. The Linux 4.13 kernel is noteworthy for a number of reasons, including multiple […]

Siemens customers were informed last week that some of the company’s automation and power distribution products are affected by vulnerabilities that can be exploited for denial-of-service (DoS) attacks and session hijacking. Sergey Temnikov of Kaspersky Lab discovered that several Siemens products using the Discovery Service of the OPC UA protocol stack are exposed to remote […]

A second wave of the Locky ransomware variant called IKARUSdilapidated has been identified by security experts. The source of the ransomware is a botnet of zombie computers coordinated to launch phishing attacks that send emails and attachments appearing to come from a targeted recipient’s trusted business-class multifunction printer. This is the second wave of IKARUSdilapidated […]

Hackers are claiming to have obtained the personal details of as many as six million Instagram users, including those of celebrities including Emma Watson, Leonardo Di Caprio and David Beckham. The cyber-criminals are believed to have exploited a bug in the popular photo service’s mobile API which exposed email addresses, phone and other profile information.Although […]

During a recent pen test of GitLab, Imperva researchers were surprised to come across a vulnerability that leaves users exposed to session hijacking attacks. The vulnerability stems from the type of session tokens used by GitLab. According to Imperva, the tokens are troublesome because: They are short, making them susceptible to brute-force attacks; they are […]

Security flaws in Facebook Messenger and Instagram let hackers propagate attacks and steal personal data. Researchers at Kaspersky Lab recently discovered cyberattacks on Instagram and Facebook Messenger intended to steal credentials and spread malware, respectively. Both instances demonstrate the potential danger when an attacker seeks power in a social network.The two attacks, while similar in […]

Google began sending out notices to site owners this month, reminding those who haven’t yet migrated from HTTP to HTTPS that in October their sites will be marked “NOT SECURE.”The warnings are directed to owners of HTTP pages that contain forms, specifically sites that include text input fields like <input type=”text”> or <input type=”email”>. The […]

Corporate information systems became more vulnerable in 2016, even as user awareness regarding information security significantly decreased. That’s the word from Positive Technologies, which found in an overview of security audit findings that critical vulnerabilities were detected in 47% of investigated corporate systems last year. During audits, experts simulate how actual attackers (external and internal) […]

What happens when cable and phone companies are left to their own devices? Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and […]

Two years ago, VMware first began talking about the concept of the “Goldilocks Zone,” where the virtualization hypervisor sits at the ideal location in the network to improve enterprise security. At the VMworld event today in Las Vegas, VMware announced that its Project Goldilocks vision is at long last becoming generally available, under the product […]

1 21 22 23 24 25 157