Hackers Fall Victims
In one of my last posts, I talked about how the hacker “La Citrix” infected his own computer with an info stealer and later sold his own data by mistake.…
In one of my last posts, I talked about how the hacker “La Citrix” infected his own computer with an info stealer and later sold his own data by mistake.…
In a recent job interview, I was asked the question if one should pay a ransom if all technical possibilities have been explored, and one has hit a dead end…
It’s not often that a company in Belize discloses information about cyber-attacks, but BEL has always been at the forefront of transparency as a cooperate citizen. In today’s release, BEL…
Of all five vulnerabilities, the most severe is CVE-2023-36460 which has been named TootRoot. In essence, this vulnerability can be used to plant backdoors on servers that deliver the content to end users.
According to the National Vulnerability Database (2023), CVE-2023-27997 which is a heap-based buffer overflow vulnerability remains unpatched in Fortinet Firewalls.