Vulnerabilities and Exploits
- ★ Meltdown & Spectre Security Vulnerabilities
- Important Security Notification Regarding Log4j2
- Juicy Potato Windows Vulnerability
- Securing Windows SMB and NetBios/NetBT Services
- Linux Kernel Local Privilege Escalation Vulnerability (CVE-2016-5195)
- Multiple OpenSSL vulnerabilities (CVE-2016-2107 and CVE-2016-2108)
- Critical OpenSSL vulnerabilities - DROWN CVE-2016-0800
- Critical Linux vulnerability CVE-2015-7547 in GNU C Library (glibc)
- Cisco Firewall vulnerabilities (cisco-sa-20160210-asa-ike)
- Botnet Troubleshooting and Guidelines
- Guide to Tinba
- Guide to Zeus Infections
- Secure your MongoDB Server
- Security vulnerability - VENOM - CVE-2015-3456 - QEMU/XEN/KVM
- Vulnerability in Windows HTTP.sys Could Allow Remote Code Execution (CVE-2015-1635 / MS15-034)
- Security vulnerabilities in OpenSSL - [19 March 2015]
- Security vulnerabilities in OpenSSL - FREAK (CVE-2015-0204) and more
- Securing your Memcached Server
- Guide to Microsoft SQL Server Browser Service Access Amplification Issues
- GHOST: glibc gethostbyname buffer overflow (CVE-2015-0235)
- Securing your REmote DIctionary Server (Redis)
- Multiple NTP vulnerabilities (CVE-2014-9293 to CVE-2014-9296 )
- Elasticsearch - CVE-2014-3120 Arbitrary Java Code Execution Vulnerability
- SSL/TLS issues - POODLE/BEAST/SWEET32 attacks and the End of SSLv3 + OpenSSL Security Advisory
- Multiple Xen vulnerabilities (XSA-*)
- Shellshock bug and other BASH vulnerabilities - (CVE-2014-6271, CVE-2014-7169, ...)
- Protecting Intelligent Platform Management Interface (IPMI) devices
- Guide to Mayhem Infection
- Installing a plug in for Wordpress XML-RPC ping back
- Regular Non-Intrusive Vulnerability Scans Performed by iWeb