Patch Tuesday Lowdown, April 2019 Edition — Krebs on Security

Posted on April 13th, 2019 by Responsible Cyber

Microsoft today released fifteen software updates to fix more than 70 unique security vulnerabilities in various flavors of its Windows operating systems and supported software, including at least two zero-day bugs. These patches apply to Windows, Internet Explorer (IE) and Edge browsers, Office, Sharepoint and Exchange. Separately, Adobe has issued security updates for Acrobat/Reader and Flash Player. […]

Read More

Review: Fidelis Deception breathes life into fake assets

Posted on April 6th, 2019 by Responsible Cyber

Deception as a defensive technology has come a long way in a very short period of time. Today, almost every enterprise network is going to have some form of deception employed to trick and trap unauthorized users. But its success is also becoming a problem because attackers are starting to expect, and in some cases […]

Read More

New Apache Web Server Bug Threatens Security of Shared Web Hosts

Posted on April 6th, 2019 by Responsible Cyber

Mark J Cox, one of the founding members of the Apache Software Foundation and the OpenSSL project, today posted a tweet warning users about a recently discovered important flaw in Apache HTTP Server software.The Apache web server is one of the most popular, widely used open-source web servers in the world that powers almost 40 […]

Read More

Quantum Computing and Code-Breaking

Posted on March 30th, 2019 by Responsible Cyber

Prepare today for the quantum threats of tomorrow. With all the grand speculation and hype tied to quantum computing, the technology seems more like it belongs in the realm of science fiction rather than your daily tech newsfeed. But this isn’t science fiction. Tech companies around the world are racing to bring quantum computers into […]

Read More

Commando VM — Turn Your Windows Computer Into A Hacking Machine

Posted on March 30th, 2019 by Responsible Cyber

FireEye today released Commando VM, which according to the company, is a “first of its kind Windows-based security distribution for penetration testing and red teaming.”When it comes to the best-operating systems for hackers, Kali Linux is always the first choice for penetration testers and ethical hackers.However, Kali is a Linux-based distribution, and using Linux without […]

Read More

Facebook Mistakenly Stored Millions of Users’ Passwords in Plaintext

Posted on March 24th, 2019 by Responsible Cyber

Holy moly, Facebook is again at the center of a new privacy controversy after revealing today that its platform mistakenly kept a copy of passwords for “hundreds of millions” users in plaintext.What’s more? Not just Facebook, Instagram users are also affected by the latest security incident.So, if you are one of the affected users, your […]

Read More

New MageCart Attacks Target Bedding Retailers My Pillow and Amerisleep

Posted on March 24th, 2019 by Responsible Cyber

Cybersecurity researchers today disclosed details of two newly identified Magecart attacks targeting online shoppers of bedding retailers MyPillow and Amerisleep.Magecart is an umbrella term researchers gave to at least 11 different hacking groups that are specialized in implanting malware code on e-commerce websites with an intent to steal payment card details of their customers silently.Magecart […]

Read More

Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack

Posted on March 14th, 2019 by Responsible Cyber

Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild. Microsoft today rolled out security fixes for 64 security vulnerabilities along with four security advisories. Of the bugs patched, 17 are rated critical, 45 are important, one moderate, and one low in severity. Four vulnerabilities are […]

Read More

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool

Posted on March 14th, 2019 by Responsible Cyber

The United States’ National Security Agency (NSA) today finally released GHIDRA version 9.0 for free, the agency’s home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications.GHIDRA is a Java-based reverse engineering framework that features a graphical user interface […]

Read More

Google Launches Backstory — A New Cyber Security Tool for Businesses

Posted on March 14th, 2019 by Responsible Cyber

Google’s one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats.Network infrastructures at most enterprises regularly generate enormous amounts of network data and logs on a daily basis that can […]

Read More