The Latest in IT Security

Posts Tagged ‘attacker’

CareFirst, a Blue Cross Blue Shield plan, has announced that they have suffered a #breach in which the attackers gained access to one of their databases. “Evidence suggests the attackers could have potentially acquired member-created user names created by individuals to access CareFirst’s website, as well as members’ names, birth dates, email addresses and subscriber […]

Read more ...

A new and critical #vulnerability uncovered by #security researchers would allow an #attacker to intercept and decrypt secured communications exchanged between users and thousands of web sites and mail servers worldwide. The vulnerability, dubbed “Logjam,” affects what’s known as the Transport Layer Security protocol that web sites, VPN servers and mail servers use to encrypt traffic. […]

Read more ...

The two primary compression algorithms used by SAP SE products, some of the most popular enterprise and business management software platforms on the market, contain multiple, remotely exploitable security vulnerabilities. Martin Gallo of Core Security Consulting Services found vulnerabilities in the decompression routines of two compression algorithms deployed across SAP’s line of products. SAP uses proprietary […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments