Network Security

Struts2 Exposed Remote Code Execution Vulnerability(S2-037)

28/06/2016 17:00:46

Struts2 revealed a vulnerability of high-risk named S2-037, CVE Number: CVE - 2016-4438, which allows hackers to take advantage of the vulnerability to directly execute arbitrary code, upload files, execute a remote command & control server, and steal all of the user's data directly. This vulnerability is affecting a wide range Struts versions....

Hacker steals 45 million accounts from hundreds of car, tech, sports forums

17/06/2016 17:00:04

A hacker has stolen tens of millions of accounts from over a thousand popular forums, which host popular car, tech, and sports communities....

Charging your smartphone’s battery over USB can be dangerous

27/05/2016 16:50:35

Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we desperately need to stay connected — to answer an important call, receive a text message or email, whatever....

Bank Hack – How to steal $25 Billion with a few lines of code

19/05/2016 16:55:10

The security researcher Sathya Prakash discovered that the critical vulnerabilities reside in the mobile banking application used by the bank customers....

Vulnerability Alert: ImageMagick Remote Code Execution Vulnerability (CVE-2016-3714)

06/05/2016 16:50:19

On Tuesday, May 3 2016, ImageMagick announced a zero-day vulnerability (CVE-2016-3714) in the ImageMagick software. The attacker can exploit the vulnerability to execute arbitrary code remotely, intercept important information and take over the servers eventually....

Struts2 was exposed high-risk vulnerability, NGAF will protect you !

27/04/2016 10:25:03

Struts2 was exposed high risk vulnerability s2-032, CVE-2016-3081, attackers could execute arbitrary remote commands through this vulnerability.The financial industry has become the hardest hit by this vulnerability for the moment,other web site which uses Struts2 open source framework should do the security work in time....

Locky Ransomware Virus

30/03/2016 10:30:03

Locky ransomware virus often spreads via emails and malicious links to Trojans. Once the file infected with the Locky virus is downloaded, it runs automatically and deletes the ransomware sample to evade anti-virus detection. Then, the Locky virus leverages Internet access permission to connect to the C&C server controlled by a hacker in order to upload information from infected endpoint devices and download a private key from the C&C server, which will be written into the registry. Therefore, files in all local disk drives will be traversed and encrypted, and texts will be presented in desktop to tell victims to pay the ransom (using BitCoins in most cases)....

Safeguard your employees against Ransomware !

22/03/2016 16:12:27

Getting infected with Ransomware always end up costing the victims thousands of dollars. The cyber-thieves’ malware works by either holding your entire computer hostage or by blocking access to all of your files by encrypting them. The Ransomware victim is typically ordered to finish the required payment in order to get the key to unlock their encrypted data....

Security Expertise as a Service - Vision to Renovate Commercial Security Solution

17/03/2016 14:58:52

To have competent technical staff dealing with skillful hackers & cyber threat risks is not realistic for most of organizations. Even when there are staff with high expertise, effective threat visibility tools are essential to assist on the risk mitigation operation. ...

WebSVN 2.3.3 Cross Site Scripting Vulnerability

12/03/2016 10:30:48

WebSVN offers a view onto your subversion repositories that's been designed to reflect the Subversion methodology. You can view the log of any file or directory and see a list of all the files changed, added or deleted in any given revision. You can also view the differences between two versions of a file so as to see exactly what was changed in a particular revision....

Our Social Networks

Global Service Center: