1,123 Results for:HTTPS
- Sort by:
Cisco VPN flaw faces attempted Akira ransomware attacks
11 Sep 2023Cisco said it became aware of 'attempted exploitation' last month and referenced an Aug. 24 security advisory saying its VPNs were under attack by the Akira ransomware gang. Read More
Ransomware gang targets critical Progress WS_FTP Server bug
13 Oct 2023The vulnerability used in the failed ransomware attack, CVE-2023-40044, is a .NET deserialization vulnerability in Progress Software's WS_FTP Server with a CVSS score of 10. Read More
How to amend a git commit
28 Nov 2023The easiest way to undo a git commit is with the git commit --amend command. This quick tutorial will show you how to quickly amend any Git commit. Read More
Critical JetBrains TeamCity vulnerabilities under attack
05 Mar 2024Exploitation activity has started against two vulnerabilities in JetBrains TeamCity, which has been targeted previously by nation-state threat actors such as Russia's Cozy Bear. Read More
5 network security predictions for 2024
04 Dec 2023Check out network security trends for 2024 from Enterprise Strategy Group, from SaaS security and rising DDoS attacks to network and endpoint convergence. Read More
Rise in fraudsters spoofing the websites of leading UK banks
07 Aug 2023Despite safeguards to protect customers from scams, UK retail banks are still seeing high volumes of fake phishing websites exploiting their brands, and the problem seems to be increasing in scope and scale Read More
SBOM formats compared: CycloneDX vs. SPDX vs. SWID Tags
17 Nov 2023Organizations can choose between three SBOM formats: CycloneDX, SPDX and SWID Tags. Learn more about them to determine which fits your organization best. Read More
5 PaaS security best practices to safeguard the app layer
11 Mar 2024Underlying APIs, language choice and cybersecurity features can vary widely across PaaS providers. These five security best practices can help in almost any PaaS scenario. Read More
Why We Should Maybe Get Hyper Over A Cloud...
14 Dec 2023This time last year I was basking in the icy cool, but mercifully dry climate of Berlin, testing SoftIron’ s HyperCloud product in its Berlin labs and very much appreciating the fantastic support ... Read More
Breaking down the DROWN attack and SSLv2 vulnerability
21 Apr 2016A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Read More