Research - Page 15

Piercing the Shield. Breaking the FunctionShield cloud security library
TL;DR We've found a vulnerability in FunctionShield, a cloud security library, that allows bypassing its tightest restrictions completely. All technical details can be found in the "Process" section. Cloud computing…
read more
Cybersecurity News V. 1.16 – Vulnerable Windows, leaky Tinder, attacked UN
NSA shares information about Windows vulnerability Microsoft security patch day revealed the information about the CVE-2020-0601 vulnerability. It exists in the way Microsoft's CryptoAPI (Crypt32.dll) validates the Elliptic Curve Cryptography…
read more
CYBERSECURITY NEWS V. 1.11. – Attacks on Austrian Foreign Ministry and Alaskan airline
Citrix ADC CVE-2019-19781 - exploits revealed A recently found vulnerability in Citrix Application Delivery Controller ADC (former NetScaler ADC) and Citrix Gateway (former NetScaler Gateway) could allow an unauthenticated attacker…
read more
Cybersecurity threats, hacks and data flaws over decade
2010 Operation Aurora – Google hack An attack that hacked Google’s backend infrastructure. Operation Aurora was a campaign organized by the Chinese government’s military hackers. It affected not only Google,…
read more
Apple bleee. Everyone knows What Happens on Your iPhone
Users value their privacy, and Apple understands that. We even see related PR activities. "What happens on your iPhone, stays on your iPhone." Let's see if it's true. TL;DR If…
read more