Apache Tomcat AJP exploit, malware in AWS, hacker movies and more!
Visit https://www.securityweekly.com/psw for all the latest episodes!
Full Episode Show Notes
To learn more...
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2012-1093PUBLISHED: 2020-02-21The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink...
In today’s digital world, there is a strong demand for stable and efficient network security to protect valuable data. Fortunately, VPN technology is...
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2014-2228PUBLISHED: 2020-02-19The XStream extension in HP Fortify SCA before 2.2 RC3 allows remote attackers to execute...
Receipt digitization addresses the challenge of automatically extracting information from a receipt. In this article, I cover the theory behind receipt digitization and...
Skyrocketing data breaches bring incalculable losses to organizations and can cost cybersecurity executives their jobs.
Here we examine the top five places in 2019...
It turns out that the widely circulated (something something) Collection #1 was actually used by hackers to launch credential stuffing attacks.These attacks were...