Recommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent …
Monthly Archives
November 2018
-
Bugs (Software and Hardware)OthersSecurityTechnical Documentation
Check Point SandBlast protected users from a Zero-Day Microsoft Office Vulnerability
by blackMOREby blackMORENeil Armstrong, the great space explorer, once said “research is all about creating new knowledge.” And of course, with knowledge we are in a better position to predict, and thus …
-
DatabaseHackingMetasploitPasswordSecurity
Automated Penetration Testing with APT2 Toolkit
by blackMOREby blackMOREAPT2 is an Automated Penetration Testing Toolkit. This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results will …
-
NewsOthersSecuritySecurity SoftwareSecurity Tools
What are the Challenges of Using Open Source Cybersecurity Tools?
by blackMOREby blackMOREBy making their source code freely available, developers of open source software rely on the power of the wider community in order to help them audit and improve their code. …
Older Posts