by Avi Samocha | Jun 23, 2017 | GhostHook, Microsoft, Windows
Image: CYBERARK Threat Research Blog A new discovery from CYBERARK Threat Research team, presents a hooking technique that allows you to control over the way the operating system behaves and enables access to the operating system’s kernel. The researchers note... by Avi Samocha | Feb 24, 2017 | Cloudbleed, CloudFlare
(Image source: The Hacker News) A security vulnerability has been discovered in CloudFlare’s HTML parser that leaked website’s sensitive data. This leaked data includes passwords, private messages, API keys, and other sensitive information. The vulnerability was... by Avi Samocha | Jan 27, 2017 | AI, Artificial Intelligence, Cyber-Attacks, Cybersecurity
These days, Artificial Intelligence (AI) is used more an more to help humanity with everyday tasks. Although AI is getting smarter and smarter every day, it seems that for better predication of cyber-attacks, a human input can still help significantly. In a new... by Avi Samocha | Oct 24, 2016 | CVE-2016-5195, Dirty COW, Linux
(Image Source: http://dirtycow.ninja) A new Linux vulnerability was found recently, allowing a user with limited access to gain root access to a Linux system. With this vulnerability, called Dirty COW (Dirty Copy-On-Write), an attacker can get write access to... by Avi Samocha | Oct 21, 2016 | Exchange, Exchange Server 2016, Microsoft
If your organization uses email for collaboration, you are probably using Microsoft Exchange. Although the word around is that email is dead, Exchange is still being used widely by organizations small to large. Exchange server was initially used internally at...
Recent Comments