-
My social media profiles:
-
Latest posts:
- Editie NL: Russische hackersgroep ‘Laundry Bear’ achter cyberaanvallen op Nederlandse politie
- NOS Stories: #TikTokRefugees massaal naar andere Chinese app
- Radio 1 Pointer: Een foto omtoveren tot naaktfoto of voorzien van borstvergroting? ‘Het is kinderspel’
- BNR: Operation Endgame – Grootste actie ooit tegen ransomware, 5 botnets uit de lucht gehaald
- Radio 1: Banken adviseren om cash geld in huis te hebben: logisch of bangmakerij?
-
Categories:
- 3FM
- advertising
- analysis
- anti-malware
- article
- automation
- backup
- banking
- biometrics
- bluetooth
- bnr nieuwsradio
- browser security
- bug
- camera
- chat-app
- child porn
- computer worm
- copyright
- critical infrastructure
- cross-site scripting
- cryptography
- cyber crime
- cyber security
- cyber terrorisme
- cyber warfare
- data leakage
- ddos
- deanonymization
- demonstration
- discussion
- drive-by
- e-voting
- election hacking
- espionage
- fake profiles
- FunX
- hacking
- hart van nederland
- identity theft
- internet of things
- interview
- javascript
- kassa
- law enforcement
- magazine
- massasurveillance
- media
- menu
- mobile phone
- multi-factor authentication
- nos
- online banking
- online dating
- osint
- password
- pentesting
- phishing
- php
- php security
- physical security
- podcast
- politics
- presentation
- privacy
- privacy awareness
- radio
- radio 1
- ransomware
- responsible disclosure
- russia
- sap
- scam
- scoping
- search engine optimization
- security
- security advice
- security assessment
- security audit
- security awareness
- security management
- security monitoring
- security vulnerability
- seo
- smart devices
- social media
- software development
- telecom
- tv
- uncategorized
- vulnerability management
- website
- website security
- wi-fi
- wiretapping
- witwassen
- zero day
-
Main menu:
Monthly Archives: November 2015
Scanning an enterprise organisation for the critical Java deserialization vulnerability
On November 6, security researchers of FoxGlove Security released five zero day exploits for WebSphere, WebLogic, JBoss, Jenkins and OpenNMS. These software products are used everywhere in enterprise organizations and with the published exploits remote malicious code can be unauthenticated executed. … Continue reading
Posted in analysis, security vulnerability, zero day
25 Comments