Lately, there has been a lot of commotion around Java vulnerabilities. Late last month, security researchers discovered zero-day java vulnerabilities being actively exploited in...
Hi, what are you looking for?
Lately, there has been a lot of commotion around Java vulnerabilities. Late last month, security researchers discovered zero-day java vulnerabilities being actively exploited in...
A Vulnerability Management (VM) program is commonly defined as the “cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities" . According to Gartner’s report...
Hackers’ Investment in Evasion Techniques Proves That They See Web Applications as a Valuable Attack Surface
The World Wide Web (WWW) has come a long way during the last decade. By contrast, the HTTP protocol, which provides the communication application...
How Browser Sync Features Can Pose a Risk to The Enterprise
On the 5th of June, a hacker uploaded a file containing approximately 6.5 million of LinkedIn’s passwords (encoded as SHA-1 hashes).