• Alerts & Warnings

    Alerts & Warnings

  • Announcements

    Announcements

  • Technology Watch

    Technology Watch

  • Intrusion Detection

    Intrusion Detection

  • Threat Intelligence

    Threat Intelligence

  • Pen Testing

    Pen Testing

Sunday September 08, 2024

Latest Security Advisories

Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.
The prevention of authorized access to a system resource or the delaying of system operations and functions.
The "Day Zero" or "Zero Day" is the day a new vulnerability is made known. In some cases, a "zero day" exploit is referred to an exploit for which no patch is available yet. ("day one"-> day at which the patch is made available).
The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. Typically the e-mail and the web site looks like they are part of a bank the user is doing business with.
SQL injection is a type of input validation attack specific to database-driven applications where SQL code is inserted into application queries to manipulate the database.
Password attack is the process of attempting to guess passwords, given the password file information or through brute force, which involves an exhaustive trying of all possibilities, one-by-one.
A type of malware that is a form of extortion. It works by encrypting a victim's hard drive denying them access to key files. The victim must then pay a ransom to decrypt the files and gain access to them again.
Cross Site Scripting (XSS) is a vulnerability in a web application that allows a third party to execute a script in the user's browser on behalf of the web application.
Cryptojacking is the act of hijacking a computer to mine cryptocurrencies against the users will, through websites, or while the user is unaware.
A Man-in-the-Middle attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties.