45 posts categorized "Tal Be'ery"

November 18, 2013

JBoss Application Server (or JBoss AS) is an open-source Java EE-based application server. JBoss AS was developed by JBoss, now a division of Red Hat. On late 2012, JBoss AS was named as WildFly. Recently,...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

November 05, 2013

Yesterday, Brian Krebs wrote an article on how several high end car/limousine service companies were breached and customer information was stolen. This resonated very strongly since some of the victims were celebrities, lawmakers and top...Read More
Share:
  • Tags:
  • Permalink
  • Comments (1)

October 08, 2013

vBulletin is a popular proprietary CMS (content management system) that was recently reported to be vulnerable to an unspecified attack vector. vBulletin is currently positioned 4th in the list of installed CMS sites on the...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

October 04, 2013

A couple of months ago ModSecurity (SpiderLabs) issued an “XSS Evasion Challenge” where they actively asked security experts and hackers to try and bypass their own XSS filters. This is a blessed initiative by a...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

August 19, 2013

A couple of weeks ago, the NSA Director, General Alexander was quoted in a Reuters article saying that in order to limit data access and potential leakage, they will cut back on 90% of NSA...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

August 13, 2013

Last week at Black Hat 2013, one of the briefings that garnered a lot of attention was ‘SSL, GONE IN 30 SECONDS – A BREACH BEYOND CRIME.’. The briefing detailed an extension of 2012’s CRIME...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

June 18, 2013

In the past, information leakage conjured images of securing data from physical theft (remember the alleged FBI laptop?) but thanks to the web, organizations need to secure information from growing “search giants”. In short, data...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

May 16, 2013

* The blog was updated on the 5/20/2013 to make corrections with respect to the target of the analyzed hacked server screenshot * Yesterday, EC Council was reported to have been compromised by a hacker...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

May 09, 2013

Earlier this week, the “Moroccan Ghosts” published a list of 52 defaced Israeli sites, replacing site content with political propaganda pages (and some cool Moroccan music). Looking into the hacked domain list, we noticed that...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

March 19, 2013

Sharing security research and intelligence makes the community as a whole safer. By uncovering and sharing information on weaknesses in the Internet, common vulnerabilities and new attack techniques, our customers and the industry learn specific...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)