More WordPress Plugin Weakness-Vulnerability
Sucuri blog has the detailed information: https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss.html In short, the plugins Jetpack and TwentyFifteen had a bad file which could be attacked by a XSS(Cross Site Scripting) method. As Sucuri…
BBQSQL – for Delicious SQL Injection Testing
Official Kali Linux BBQSQL site: http://tools.kali.org/vulnerability-analysis/bbqsql BBQSQL is a Python based blind SQL injection tool to test your SQL connections on the Internet. (why bbq? because SQL injection is delicious)…
Oct: Swipe&Sign + Breach = Merchant Liable Not CC companies
The Cybersecurity field knows this has been in the works for a year now, and in 5 months it will happen. Chip in a Credit card The US will catch…
We Must Master The Cybersecurity Basics
A great SECINT (Security Intelligence) paper John Stewart wrote: http://www.cisco.com/web/about/security/intelligence/JNS_TTPs.pdf Basics must be mastered: patching Identity: Strong identity, federated Identity, and identity based networking Eliminate dark space Notice that the…
Linux Servers Can Get Malware Too
Yes it is a big deal, since many IT folks do not know that malware is on all computers, Malware is short for malicious software and is typically “installed” in…
