1,123 Results for:HTTPS

  • Sort by: 

Cisco VPN flaw faces attempted Akira ransomware attacks

By Alexander Culafi 11 Sep 2023

Cisco said it became aware of 'attempted exploitation' last month and referenced an Aug. 24 security advisory saying its VPNs were under attack by the Akira ransomware gang. Read More

Ransomware gang targets critical Progress WS_FTP Server bug

By Alexander Culafi 13 Oct 2023

The vulnerability used in the failed ransomware attack, CVE-2023-40044, is a .NET deserialization vulnerability in Progress Software's WS_FTP Server with a CVSS score of 10. Read More

How to amend a git commit

By Cameron McKenzie 28 Nov 2023

The easiest way to undo a git commit is with the git commit --amend command. This quick tutorial will show you how to quickly amend any Git commit. Read More

Critical JetBrains TeamCity vulnerabilities under attack

By Arielle Waldman 05 Mar 2024

Exploitation activity has started against two vulnerabilities in JetBrains TeamCity, which has been targeted previously by nation-state threat actors such as Russia's Cozy Bear. Read More

5 network security predictions for 2024

By John Grady 04 Dec 2023

Check out network security trends for 2024 from Enterprise Strategy Group, from SaaS security and rising DDoS attacks to network and endpoint convergence. Read More

Rise in fraudsters spoofing the websites of leading UK banks

By Alex Scroxton 07 Aug 2023

Despite safeguards to protect customers from scams, UK retail banks are still seeing high volumes of fake phishing websites exploiting their brands, and the problem seems to be increasing in scope and scale Read More

SBOM formats compared: CycloneDX vs. SPDX vs. SWID Tags

By Ravi Das 17 Nov 2023

Organizations can choose between three SBOM formats: CycloneDX, SPDX and SWID Tags. Learn more about them to determine which fits your organization best. Read More

5 PaaS security best practices to safeguard the app layer

By Ed Moyle 11 Mar 2024

Underlying APIs, language choice and cybersecurity features can vary widely across PaaS providers. These five security best practices can help in almost any PaaS scenario. Read More

Why We Should Maybe Get Hyper Over A Cloud...

By Steve Broadhead 14 Dec 2023

This time last year I was basking in the icy cool, but mercifully dry climate of Berlin, testing SoftIron’ s HyperCloud product in its Berlin labs and very much appreciating the fantastic support ... Read More

Breaking down the DROWN attack and SSLv2 vulnerability

By Michael Cobb 21 Apr 2016

A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Read More