Nearly 800,000 FTP Servers Accessible Online Without Authentication

26/09/2016 14:30:04

A recent brute-force scan of FTP servers available online via an IPv4 address revealed that 796,578 boxes can be accessed without the need for any credentials....

MySQL Exploit Remote Root Code Execution Privesc Vulnerability

14/09/2016 18:30:34

An independent research has revealed multiple severe MySQL vulnerabilities. This advisory focuses on a critical vulnerability with a CVEID of CVE-2016-6662.which can allow attackers to (remotely) inject malicious settings into MySQL configuration files (my.cnf) leading to critical consequences....

Google Chrome to start marking HTTP connections as insecure

13/09/2016 15:17:57

To push more websites to implement encryption and to better protect users, Google will start flagging plain HTTP connections as insecure in its popular Chrome browser....

Best Practices to Protect yourself against Ransomware

07/09/2016 11:56:04

Ransomware is a malicious software that cyber-criminals use to hold your files (or computer) for ransom and requiring you to pay a certain amount of money to get them back by encrypting your files. How to protect yourself against it ?...

Zabbix SQL Injection Vulnerability

25/08/2016 12:30:59

On Aug 12th, 2016, 1n3 exposed by email that SQL injection vulnerability exists when jsrpc.php file of Zabbix processes profileIdx2 parameter, which is similar to a previous SQL injection with INSERT statement when latest.php file processes toggle_ids parameter. The only difference between the two is the attacking point. ...

$2.5 MILLION-A-YEAR RANSOMWARE-AS-A-SERVICE Ring Uncovered

24/08/2016 12:00:06

Researchers claim to have found the largest ransomware-as-a-service (RaaS) ring to date. The operation generates an estimated $2.5 million annually and targets computer users with a new variant of the notorious Cerber ransomware....

Beware! Advertisers Are Tracking You via Phone's Battery Status

15/08/2016 11:55:36

Forget about supercookies, apps, and malware; your smartphone battery status is enough to monitor your online activity, according to a new report....

Four Flaws hit HTTP/2 Protocol that could allow Hackers to Disrupt Servers

06/08/2016 11:40:19

If you think that the HTTP/2 protocol is more secure than the standard HTTP (Hypertext Transfer Protocol), then you might be wrong, as it took researchers just four months to discover four flaws in the HTTP/2 protocol....

QRLJacking - Hacking Technique to Hijack QR Code Based Quick Login System

29/07/2016 17:15:44

Do you know that you can access your WeChat, Line and WhatsApp chats on your desktop as well using an entirely different, but fastest authentication system?...

Struts2 devMode Remote Code Execution Vulnerability

18/07/2016 17:25:31

In recent months, Struts2 exposed several critical vulnerabilities. This vulnerability appears when devMode is enabled, and allows attackers to execute code remotely. Even arbitrary instructions can be executed remotely if WebService startup privilege is the highest, such as commands for shutdown, creating new user accounts, deleting all the files on the server, and so on. ...

Our Social Networks

Global Service Center:

COPYRIGHT © 2000-2017 SANGFOR TECHNOLOGIES CO., LTD. ALL RIGHTS RESERVED.