by Florian Bogner The case was originally published at: https://bogner.sh/2018/11/0-day-in-elba5s-network-installation-overtaking-your-companys-bank-account/ This blog post is about a previously unknown critical vulnerability in …Read More
Dale PetersonCatalyst For ICS CybersecurityFounder and CEO of Digital Bond, Inc. The article was originally published at: https://www.linkedin.com/pulse/ics-iiot-market-segmentation-needed-so-we-can-dale-peterson/ There have been …Read More
History In the recent year, major tech giants, like Google, Facebook, Magento, Shopify, Uber, Twitter, and Microsoft, have undergone XML …Read More
Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware – Webinar on Feb 27th 3 PM EST!
Machine Learning (ML) has become the shiny new object for security and is the foundational pillar of products such as …Read More
Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution
Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the …Read More
I am currently working in the RCNTEC company where I have a deal with distributed environments everyday. Once I had …Read More