Cybersecurity

Podcast Episode 8: Industrial Cybersecurity – From HVAC Systems to Conveyor Belts

Podcast Episode 8: Industrial Cybersecurity – From HVAC Systems to Conveyor Belts Tripwire’s General Manager of Industrial Cybersecurity, Kristen Poulos,…

5 ans ago

Old GTP protocol vulnerabilities will also impact future 5G networks

Old GTP protocol vulnerabilities will also impact future 5G networks Source : Old GTP protocol vulnerabilities will also impact future 5G…

5 ans ago

South African bank to replace 12m cards after employees stole master key

Master key stolen Postbank says employees printed its master key at one of its data centers and then used it…

5 ans ago

SMBleedingGhost Writeup Part II: Unauthenticated Memory Read – Preparing the Ground for an RCE

Introduction In our previous blog post, we demonstrated how the SMBGhost bug (CVE-2020-0796) can be exploited for local privilege escalation.…

5 ans ago

COVID-19’s Impact on Data Privacy

COVID-19 has heightened the emphasis on cybersecurity issues. But as people slowly make their way back to the workplace, there…

5 ans ago

GReAT Ideas. Powered by SAS: malware attribution and next-gen IoT honeypots

Get the inside scoop on GReAT, Kaspersky’s Global Research and Analysis team, which works on uncovering APTs, cyber-espionage campaigns, major…

5 ans ago

The Latest Mobile Security Threats and How to Prevent Them

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use…

5 ans ago

Over 100,000 Security Cameras in U.K. Are Hackable

New research from consumer advocacy organization Which? revealed that more than 100,000 wireless security cameras installed in U.K. homes and…

5 ans ago

Des failles du protocole GTP (GPRS Tunneling Protocol) laissent la 5G et d’autres réseaux mobiles ouverts aux vulnérabilités

Les failles du protocole GTP (GPRS Tunneling Protocol, en anglais) affectent les réseaux mobiles et 5G mettant en danger les…

5 ans ago

Les actions visant à améliorer la diversité des sexes dans la cybersécurité

Un rapport du CREST met en évidence les actions visant à améliorer la diversité des sexes dans le secteur de…

5 ans ago

This website uses cookies.