EXPERT ADVICE |
WordPress REST API flaw: How did it lead to widespread attacks? |
A REST API endpoint vulnerability enabled attacks on 1.5 million sites running WordPress. Expert Michael Cobb explains how this vulnerability works and how to prevent attacks. |
Ticketbleed flaw: How can SSL session identities be protected? |
The Ticketbleed flaw in F5 Networks' BIG-IP appliances leaks uninitialized memory and SSL session identities. Expert Michael Cobb explains how enterprises can mitigate it. |
How to detect preinstalled malware in custom servers |
Preinstalled malware was reportedly found by Apple in its custom servers. Expert Nick Lewis explains how enterprises can protect themselves from encountering similar issues. |
How did a Moodle security vulnerability enable remote code execution? |
A series of logic flaws in Moodle enabled attackers to remotely execute code on servers. Expert Michael Cobb explains how the Moodle security vulnerability can be exploited. |
Common web application login security weaknesses and how to fix them |
Flawed web application login security can leave an enterprise vulnerable to attacks. Expert Kevin Beaver reviews the most common mistakes and how to fix them. |
No comments:
Post a Comment