-
My social media profiles:
-
Latest posts:
- BNR Nieuwsradio: Veel software in ziekenhuizen is stokoud en gevoelig voor hackers
- BNR Nieuwsradio: ‘Het verkiezingsproces weer betrouwbaar en transparant’
- Cybersecurity awareness presentatie
- Radio 1 WNL: Kunnen oplichters aan de haal met niet-versnipperd papier uit de vuilnisbak?
- France 5: The danger of kids’ exposure on social media
-
Categories:
- 3FM
- advertising
- analysis
- anti-malware
- article
- automation
- backup
- banking
- biometrics
- bluetooth
- bnr nieuwsradio
- browser security
- bug
- camera
- chat-app
- child porn
- computer worm
- copyright
- critical infrastructure
- cross-site scripting
- cryptography
- cyber crime
- cyber security
- cyber terrorisme
- cyber warfare
- data leakage
- ddos
- deanonymization
- demonstration
- discussion
- drive-by
- e-voting
- election hacking
- espionage
- fake profiles
- FunX
- hacking
- hart van nederland
- identity theft
- internet of things
- interview
- javascript
- kassa
- law enforcement
- magazine
- massasurveillance
- media
- menu
- mobile phone
- multi-factor authentication
- nos
- online banking
- online dating
- osint
- password
- pentesting
- phishing
- php
- php security
- physical security
- podcast
- politics
- presentation
- privacy
- privacy awareness
- radio
- radio 1
- ransomware
- responsible disclosure
- russia
- sap
- scam
- scoping
- search engine optimization
- security
- security advice
- security assessment
- security audit
- security awareness
- security management
- security monitoring
- security vulnerability
- seo
- smart devices
- social media
- software development
- telecom
- tv
- uncategorized
- vulnerability management
- website
- website security
- wi-fi
- wiretapping
- witwassen
- zero day
-
Main menu:
Monthly Archives: November 2015
Scanning an enterprise organisation for the critical Java deserialization vulnerability
On November 6, security researchers of FoxGlove Security released five zero day exploits for WebSphere, WebLogic, JBoss, Jenkins and OpenNMS. These software products are used everywhere in enterprise organizations and with the published exploits remote malicious code can be unauthenticated executed. … Continue reading
Posted in analysis, security vulnerability, zero day
25 Comments