Category: Programming

New Flaws Expose EVlink Electric Vehicle Charging Stations to Remote Hacking

New Flaws Expose EVlink Electric Vehicle Charging Stations to Remote Hacking

A number of new vulnerabilities have been patched by Schmidt Electric, exposing its EVlink electric vehicle charging stations to remote hacking attacks. In an announcement on December 14, Schneider encouraged its customers to apply patches immediately. The flaws have been found to impact EVlink City (EVC1S22P4 and EVC1S7P4), Parking (EVW2, EVF2 and EVP2PE) and Smart Wallbox

Read More
FBI Sees APTs Exploiting Recent ManageEngine Desktop Central Vulnerability

FBI Sees APTs Exploiting Recent ManageEngine Desktop Central Vulnerability

The Federal Bureau of Investigation (FBI) has issued a warning about a recent vulnerability in Zoho’s ManageEngine Desktop Central software being exploited. Malware operators are using an authentication bypass bug in the IT management platform to compromise Desktop Central first, then download other remote access tools and malware with the goal of moving laterally through

Read More
Lack Of API Visibility Undermines Basic Principle Of Security

Lack Of API Visibility Undermines Basic Principle Of Security

You cannot secure what is outside of your visibility. Therefore visibility acts as a beginning point towards monitoring and protecting the surface attacks. Various technical challenges have emerged over time, including the decision in the late 1990s to “let it all in” with HTTP, the subsequent introduction and widespread use of encrypted traffic, the rise

Read More
ThreatBox: — Linux-based attack platform that is controlled by IA.

ThreatBox: — Linux-based attack platform that is controlled by IA.

ThreatBox is a Linux-based assault platform that is both standard and controlled. I’ve used a version of this for years. It began as a collection of scripts, then evolved into a rolling virtual machine, then into code for creating a Linux ISO, and finally into an ansible playbook set. • Customizations to make security testing

Read More

Write for Us

    Get in Touch To get Free Demo

    We are available 24 * 7, Contact Us and Avail Exciting Discount Offers​