Google on Thursday outlined a set of initiatives aimed at improving the vulnerability management ecosystem and establishing greater transparency measures around exploitation....
As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of...
Developers around the world depend on open source components to build their software products. According to industry estimates, open source components account...
Here’s the main new features and improvements in Faraday v3.3: Workspace archive You are now able to make the whole workspace read...
Faraday is the Integrated Multiuser Risk Environment you have always been looking for! It maps and leverages all the data you generate in real time,...
Faraday introduces a new concept – IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of...
Atlassian has released fixes to resolve a critical security flaw in Jira Service Management Server and Data Center that could be abused...
Protecting sensitive organizational credentials, limiting privileged user access, actively imposing security policies, and monitoring and recording privileged user behavior across virtual, cloud,...
A few days ago, the security teams of F5 Networks reported the correction of more than 50 vulnerabilities in various versions of...
Hewlett Packard Enterprise (HPE) security teams report a severe vulnerability in Sudo, the open source program used by the Aruba AirWave solution....
Cybersecurity specialists report the discovery of a critical vulnerability in Medisol, a medical services management system developed by the technology firm Codester....
Mondoo Mondoo is a natural language query system for scanning, deploying and remediating your cloud-native applications. Feature Insights into your fleet Ask...
The company discovered a severe security flaw during a routine process Cisco has notified its customers that it is necessary to install...
One Security vulnerability assessment/management tool to solve all the security team problems. What is Jackhammer? Jackhammer is a collaboration tool built with...
Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses...
Taking advantage of Intel ME technology, within which attackers can execute unsigned code on the target machine. This leads to a full...