The Latest in IT Security

Posts Tagged ‘Metasploit’

A “cybersecurity enthusiast” that goes by VectorSEC on Twitter has published AutoSploit, a Python-based tool that takes advantage of Shodan and Metasploit modules to automate the mass exploitation of remote hosts. Read More

Read more ...

Users visiting the popular Crunchyroll anime-streaming website from 03:30 to 06:00 Pacific Time on Sunday Nov. 5, were redirected to a seemingly legitimate website asking users to install an updated version of their respective video player. The version, of course, was tampered with. Read More

Read more ...

A new vulnerability found in Microsoft Internet Explorer affects Internet Explorer version 8.  The vulnerability allows attackers to execute code on a machine by just having the user visit a malicious website. This can happen, for example, when the user is tricked into clicking a link in an email or via compromised legitimate websites, such […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments