Summary
Throughout 2020 IBM X-Force saw a proliferation of malware created using the Go programming language, now some of that focus seems to be shifting onto the Nim programming language, with the latest addition being the Nimar Backdoor.
Threat Type
Vulnerability
Overview
Throughout 2020 IBM X-Force saw a proliferation of malware created using the Go programming language, now some of that focus seems to be shifting onto Nim. Nim is a flexible, statically typed programming language which is notable for hav
Summary
The Android Security Bulletin for April has been released and provides information on the thirty-six vulnerabilities that are addressed in this bulletin.
Threat Type
Vulnerability
Overview
The April security bulletin for Android has been released. In it, thirty-six vulnerabilities are addressed. Some of the potential impacts of successful exploitation of the vulnerabilities are information disclosure, privilege escalation, and remote code execution. Two of the vulnerabilities were rated as "Critical
We all know that we're on camera pretty much constantly -- most coffee shops, convenience stores, and even offices employ security cameras for protection. But what happens when those devices built to keep us safe become unsafe?
To Akamai's Co-Founder Danny Lewin, calling someone a "Titan" was the highest praise he would give. Danny himself was a remarkably talented and hard-working leader whose heart, passion, and spirit still inspire us.
The first rule of edge compute thought leadership is: don't overuse the term edge. Over the course of my blog series on the topic, I have defined the edge, explained edge computing, and discussed the economics of edge computing.
Summary
Cisco has published fifteen Security Advisories. Of the advisories, two are rated as Critical, four are rated as High, and nine are rated as Medium.
Threat Type
Vulnerability
Overview
Cisco has published fifteen Security Advisories. Of the advisories, two are rated as Critical, four are rated as High, and nine are rated as Medium. For all advisories listed below, it is noted that Cisco's Product Security Incident Response Team (PSIRT) is "not aware of any public announcements or malicious use of the
We dig into the credential stuffing attack tool OpenBullet and look at configuring combolists, proxies, parse tokens, and check blocks for launching attacks.
Summary
Microsoft released a security update for its Chromium-based Edge browser that addresses six CVE-numbered vulnerabilities.
Threat Type
Vulnerability
Overview
A security update for Microsoft's Chromium-based Edge browser has been released. Six CVE-numbered vulnerabilities are addressed in the update. The most serious of the vulnerabilities, if successfully exploited, could potentially allow a remote attacker to execute arbitrary code on an affected system. Further details are available from the links
Summary
VMWare published a security advisory, VMSA-2021-0005, that addresses an authentication bypass vulnerability in the VMware Carbon Black Cloud Workload appliance.
Threat Type
Vulnerability
Overview
VMWare published a security advisory, VMSA-2021-0005, that addresses a vulnerability (CVE-2021-21982) in the VMware Carbon Black Cloud Workload appliance. The vulnerability is an authentication bypass issue which could potentially allow a remote attacker to obtain administrative access to an affected device