Blog

Trending
Research – csa_87.txt

Research – CryptoPHP – Analysis Of A Hidden Threat Inside Popular Content Management Systems

Research – Cryptography.pdf

Research – Cryptography – The Magic Of The Asymmetric


NewsSomething is always happening



Cyber Security

Hackers Breached Colonial Pipeline Using Compromised VPN Password

October 18, 20210Comments

Cyber Security

Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn’t paid

October 18, 20210Comments

Cyber Security

Hackers Using a Windows OS Feature to Evade Firewall and Gain Persistence

October 18, 20210Comments

Cyber Security

How Companies Can Protect Themselves from Password Spraying Attacks

October 18, 20210Comments


ToolsUpdates on the latest tools



Tools

zorp-0.7.14.tar.gz – Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize out of band authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

2 hours ago0Comments

Tools

Zorp Proxy Firewall Suite 3.9.3 – Zorp is a proxy firewall suite with its core architecture built around today’s security demands.

2 hours ago0Comments

Tools

zorp-0.8.0.tar.gz – Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize out of band authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

2 hours ago0Comments

Tools

Zorp Proxy Firewall Suite 3.9.5 – Zorp is a proxy firewall suite with its core architecture built around today’s security demands.

2 hours ago0Comments


ExploitsPublicly available exploits for known vulnerabilities



CVEsUpdates from the Common Vulnerabilities and Exposures system



CVEs

CVE-2020-27181 – A hardcoded AES key in CipherUtils.java in the Java applet of konzept-ix

18 hours ago0Comments

CVEs

CVE-2020-27208 – The flash read-out protection (RDP) level is not enforced during the devi

18 hours ago0Comments

CVEs

CVE-2020-27182 – Multiple cross-site scripting (XSS) vulnerabilities in konzept-ix publiXo

18 hours ago0Comments

CVEs

CVE-2020-27209 – The ECDSA operation of the micro-ecc library 1.0 is vulnerable to simple

18 hours ago0Comments


AdvisoriesNotices of known vulnerabilities



ResearchWhitepapers and other docs by third-parties.



research

Research – Cryptanalysis Of INCrypt32 In HID’s iCLASS Systems

7 seconds ago0Comments

research

Research – Cryptography – The Magic Of The Asymmetric

7 seconds ago0Comments

research

Research – Cryptography.pdf

7 seconds ago0Comments

research

Research – CryptoPHP – Analysis Of A Hidden Threat Inside Popular Content Management Systems

7 seconds ago0Comments


Our communityUpdates from our Discord Members



Caribbean InfoSec Women (CIW)

Meet Siobhan Wilson from Jamaica

November 21, 20200Comments

Caribbean InfoSec Women (CIW)

Meet Kwailan Bridgewater from Trinidad and Tobago

November 2, 20200Comments

Caribbean InfoSec Women (CIW)

Week 36 – What’s happening in InfoSec – by Rishauna Gunning

September 6, 20200Comments

Caribbean InfoSec Women (CIW)

Week 35 – What’s happening in InfoSec – by Tavian Hall

August 30, 20200Comments

Caribbean Cyber Team (CCT)

Dwayne K. Smith’s Security+ exam pass and review

August 24, 20200Comments

Caribbean InfoSec Women (CIW)

Week 34 – What’s happening in InfoSec – by Rishauna Gunning

August 21, 20200Comments

Caribbean InfoSec Women (CIW)

Meet Maya Archie from T&T

August 15, 20200Comments

Caribbean InfoSec Women (CIW)

W33 – What’s happening in InfoSec – by Tavian Hall from Jamaica

August 14, 20200Comments


VideosCurated just for you.

More Posts