Weaknesses

ADenum – A Pentesting Tool That Allows To Find Misconfiguration Through The The Protocol LDAP And Exploit Some Of Those Weaknesses With Kerberos

AD Enum is a pentesting tool that allows to find misconfiguration through the protocol LDAP and exploit some of those… Read More

2 years ago

Cloud Security Alliance Examines Top 10 Blockchain Attacks, Vulnerabilities, and Weaknesses

The paper aims to educate everyone from developers to compliance officers and day-to-day cryptocurrency users so that they might avoid… Read More

3 years ago

New APT ChamelGang Uses Supply Chain Weaknesses to Target Russian Energy, Aviation Firms

The new APT group is specifically targeting the fuel and energy complex and aviation industry in Russia, exploiting known vulnerabilities… Read More

3 years ago

U.S. Intelligence Agencies Warn About Security Weaknesses in 5G Networks

The analysis, which aims to identify and assess risks and vulnerabilities introduced by 5G adoption, was published on Monday by… Read More

3 years ago

Australia: 328 weaknesses found by WA Auditor-General in 50 local government systems

The computer systems of 50 Western Australian local government entities were probed and the result was the finding of 328… Read More

3 years ago

U.S. Intelligence Agencies Warn About 5G Network Weaknesses

Inadequate implementation of telecom standards, supply chain threats, and weaknesses in systems architecture could pose major cybersecurity risks to 5G… Read More

3 years ago

IG: Cybersecurity Weaknesses Persist in US Energy Dept.

Cybersecurity weaknesses persist throughout the U.S. DOE's unclassified networks, including those of the National Nuclear Security Administration, according to an… Read More

3 years ago

Smart sex toys come with Bluetooth and remote hijacking weaknesses

The main concern highlighted by the researchers is, that newer wearables are equipped with many features such as online conferencing,… Read More

3 years ago

North Korean Hackers Exploiting Psychological Weaknesses

Although the tactic was unique considering the targeting of security researchers, it is not technically novel. This incident is a… Read More

3 years ago