If you are hosting a web application, then the only open TCP ports through your firewall should be 80 and...
Cyber Warfare
Overview The FBI assesses a group of malicious cyber actors—likely located in Iran—use Virtual Private Server infrastructure hosted in the...
A BotNet c2 server ordering bots to attack a target. A cyber war is coming, our adversaries are preparing for...
Blacklists Part of a defense in depth strategy for cyber security is having the hostile attacker deal with multiple obstacles...
When creating web applications these days security must come first. Building the application without security and then attempting to retrofit it...
Palo Alto Networks released an update to PAN-OS yesterday, which patches five vulnerabilities: Critical - Unauthenticated Buffer Overflow in GlobalProtect/SSL VPN...
This vulnerability, CVE 2016-1287, should get your attention if you are using any of the Cisco ASA firewalls listed below, you...
Grant using airodump-ng on the big screen. While conducting an Air Assault on a wireless network, my weapon of choice is...
The Metasploit Framework is not something that runs out and exploits all available targets automatically. This is not a script...
I've been noticing this for weeks now. A massive NTP amplification attack from Guangzhou China on Roseville California.