Security

SOAR Giacomo Lanzi

SOAR: coordination for cyber security

SOAR (Security Orchestration, Automation and Response) technology helps coordinate, execute and automate activities between people and tools, enabling companies to respond quickly to cyber security attacks. The aim is to improve their overall security position. SOAR tools use playbooks (strategies and procedures) to automate and coordinate workflows which may include security tools and manual tasks. How does SOAR help in…

SOAR Security Orchestration Giacomo Lanzi

SOAR: what it is and how it can be useful for companies

An increasing number of companies leverage SOAR to improve the effectiveness of their cybersecurity operations. In this article, we explain how harnessing the value of SOAR could be crucial to improving the security of your organization. What is SOAR? Coined by the research firm Gartner, Security Orchestration, Automation and Response (SOAR) is a term used to describe the convergence of…

Next Generation SIEM Giacomo Lanzi

Next Generation SIEM: where are we?

SIEM has existed for quite some time, but it is not yet well understood. Also, the fact that technology has evolved significantly in recent years doesn’t help shed some light. Today we see where we are, trying to understand the Next Generation SIEM and the managed systems offered as services that make use of the latest generation SIEM (SOCaaS, for…

Standard ISO 27001 Giacomo Lanzi

Does ISO 27001 standard require a Pentest?

A legitimate question that often arises is whether the Penetration Test is necessary for compliance with the ISO 27001 standard. To fully understand the answer, it is necessary to clarify what is meant by these terms and to understand the relationship between all the components of the certification. ISO 27001 standard A technical standard, also incorrectly called a standard, is…

SIEM informatica Giacomo Lanzi

SIEM in computer science: history

A SIEM solution in IT is one of the essential components of a SOC (Security Operation Center). Its task is to collect information and analyze it in search of anomalies and possible breaches in the system. But the defense process hasn’t always been that simple. What we now call SIEM, Security Information and Event Management, is the union of two…

SIEM - Raccolta e analisi dei dati Giacomo Lanzi

SIEM software: what it is and how it works

Evolving beyond its roots in log file management, today’s security information and event management (SIEM) software vendors are introducing AI, advanced statistical analysis and other analytical methods into their products. . But what is SIEM software and what are its uses? SIEM software Acronym for Security Information and Event Management, it is a product that provides cyber security professionals in…

Network Lateral Movement Giacomo Lanzi

What is a Network Lateral Movement and how to defend yourself

During a cyber attack, hackers have only one goal in mind. This goal could be accessing a developer’s machine and stealing a project’s source code, analyzing emails from a particular executive, or extracting customer data from a server. All they have to do is log into the machine or system that contains the data they want, right? Not exactly. Actually,…

Mitre Att&ck cover Giacomo Lanzi

Mitre Att&ck ™: an overview

Mitre Att&ck is a global knowledge base of adversary tactics and techniques based on real observations of cyber attacks. These are displayed in arrays organized by attack tactics, from initial system access and data theft to machine control. There are arrays for common desktop platforms (Linux, macOS and Windows) and for mobile ones. What is MITRE ATT&CK ™ and what does…

SOCaaS - Post Cover Giacomo Lanzi

Is SOCaaS useful for your business?

In today’s article, we’ll explain what a Security Operations Center (SOC) is and help determine if a SOC-as-a-Service (SOCaaS) solution is right for your business. Just because you have to manage cybersecurity doesn’t mean your business has to deal with cybersecurity. In fact, your core business could be pretty much anything else. Proper management of IT security, however, is essential…

Sicurezza delle reti informatiche con il Pentest e il Vulnerability assessment Giacomo Lanzi

Computer network security: PT vs. VA

The security of computer networks is of vital importance for a company. With technologies increasingly relying on remote services, it is good to ensure that security is guaranteed. To do this, two tools are used: Vulnerability Assessment and Penetration Test. But what is the difference between them? The answer to this question is not as obvious as one might think….

pentest e sicurezza informatica Giacomo Lanzi

Security: pentest and verification of vulnerabilities

The computer security of a system is very important to avoid unpleasant inconveniences due to malicious attacks. In principle, it is not enough to set up a complete security system, you must also check that the above systems are working. To do this we turn to professionals who can carry out pentest (penetration tests) and carry out a vulnerability check….

Piergiorgio Venuti

Path traversal in Photo Gallery (WordPress plugin)

Path traversal in Photo Gallery may allow admins to read most files on the filesystem (WordPress plugin) Please follow and like us:

Piergiorgio Venuti

CVE-2017-7620 Mantis Bug Tracker

CVE-2017-7620 Mantis Bug Tracker 1.3.10 / v2.3.0 CSRF Permalink Injection Please follow and like us:

Piergiorgio Venuti

WordPress Newsletter Supsystic 1.1.7

WordPress Newsletter Supsystic 1.1.7 – Cross Site Scripting Vulnerability Please follow and like us:

Piergiorgio Venuti

[CVE-2017-5868] OpenVPN Access Server

[CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation Please follow and like us:

Piergiorgio Venuti

Linux Kernel Privilege Escalation

SSD Advisory – Linux Kernel XFRM Privilege Escalation Please follow and like us:

Piergiorgio Venuti

SSD Advisory – Linux Kernel AF_PACKET Use-After-Free

Please follow and like us:

Piergiorgio Venuti

SSD Advisory – Webmin Multiple Vulnerabilities

Please follow and like us:

Piergiorgio Venuti

SSD Advisory – PHP Melody Multiple Vulnerabilities

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Ad Widget Plugin Local File Inclusion Security Vulnerability

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Simple Login Log Plugin Multiple SQL Injection Security Vulnerabilities

Please follow and like us:

Piergiorgio Venuti

WordPress does not hash or expire wp_signups.activation_key allowing an attacker with SQL injection to create accounts

Please follow and like us:

Piergiorgio Venuti

DefenseCode Security Advisory: Magento Commerce CSRF, Stored Cross Site Scripting #1

Please follow and like us:

Piergiorgio Venuti

Exploit toolkit for CVE-2017-8759 – Microsoft .NET Framework RCE (Builder + listener + video tutorial)

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress PressForward Plugin Security Vulnerability

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Podlove Podcast Publisher Plugin Security Vulnerability

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Easy Modal Plugin Multiple Security Vulnerabilities

Please follow and like us:

Piergiorgio Venuti

Stop User Enumeration allows user enumeration via the REST API (WordPress plugin)

Please follow and like us:

Piergiorgio Venuti

Defense in depth — the Microsoft way (part 48): privilege escalation for dummies — they didn’t make SUCH a stupid blunder?

Please follow and like us:

Cyber Risk Insurance Piergiorgio Venuti

Cyber Risk Insurance

Cyber Risk Insurance In the light of the recent cyber attacks and the rise of ransomware (like WannaCry and Petya), Secure Online Desktop in collaboration with Broker Busani Stefano of Union Brokers (see BROKER PRESENTATION) is pleased to present the Cyber Risk Assurance Guarantee as a valuable tool to increase The security of your data. Cyber Risk Insurance – Description…

Piergiorgio Venuti

Multiple Local Privilege Escalation Vulnerabilities in Acunetix Web Vulnerability Scanner 11

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress AffiliateWP Plugin Security Vulnerability

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Huge-IT Video Gallery Plugin Security Vulnerability

Please follow and like us:

Piergiorgio Venuti

Joomla com_tag v1.7.6 – (tag) SQL Injection Vulnerability

Please follow and like us:

Piergiorgio Venuti

Qualys Security Advisory – CVE-2017-1000367 in Sudo’s get_process_ttyname() for Linux

Please follow and like us:

Piergiorgio Venuti

Defense in depth — the Microsoft way (part 48): privilege escalation for dummies — they didn’t make SUCH a stupid blunder?

Please follow and like us:

Piergiorgio Venuti

Microsoft Dynamic CRM 2016 – Cross-Site Scripting vulnerability

Please follow and like us:

Piergiorgio Venuti

Executable installers are vulnerable^WEVIL (case 52): escalation of privilege with Microsoft’s .NET Framework installers

Please follow and like us:

Piergiorgio Venuti

Reflected XSS in WordPress Download Manager could allow an attacker to do almost anything an admin can (WordPress plugin)

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress All In One Schema.org Rich Snippets Plugin Security Vulnerability

Please follow and like us:

Piergiorgio Venuti

[CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation

Please follow and like us:

Piergiorgio Venuti

Stealing Windows Credentials Using Google Chrome

Please follow and like us:

Piergiorgio Venuti

WordPress EELV Newsletter v4.5 – Multiple Vulnerabilities

Please follow and like us:

Piergiorgio Venuti

Ransomware & BaaS

Episodes like the one that happened yesterday remind us more and more of the importance of having a backup. Backup in Cloud can be a valuable countermeasure to Ransomware (to know more about Ransomware see the comprehensive guide about Ransomware from Cloudwards). https://www.nytimes.com/2017/05/13/world/asia/cyberattacks-online-security-.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=first-column-region&region=top-news&WT.nav=top-news&_r=0   Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: GOOGLE google-api-php-client Multiple Security Vulnerabilities

Please follow and like us:

Piergiorgio Venuti

DefenseCode WebScanner DAST Advisory: WordPress User Access Manager Plugin Security Vulnerability

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Tracking Code Manager Plugin Multiple Security Vulnerabilities

Please follow and like us:

Piergiorgio Venuti

CSRF in wordpress plugin clean login allows remote attacker change wordpress login redirect url or logout redirect url to evil address

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress WebDorado Gallery Plugin SQL Injection Vulnerability

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Spider Event Calendar Plugin SQL Injection Vulnerability

Please follow and like us:

Piergiorgio Venuti

DefenseCode ThunderScan SAST Advisory: WordPress Facebook Plugin SQL Injection Vulnerability

Please follow and like us:

Two Factor Authentication Piergiorgio Venuti

Two Factor Authentication

Two Factor Authentication Protect your Client Area with Two Factor Authentication via Google Authenticator Now you can protect your Client Area login with Google Authenticator so you will add and extra layer of security on your Cloud Account.   Two Factor Authentication How to enable Google Authenticator on Secure Online Desktop account 1 Access to your Client Area and log in with your…

Alessandro Stesi

Cross-Site Scripting vulnerability in Trust Form WordPress Plugin

Please follow and like us:

Alessandro Stesi

Cross-Site Scripting vulnerability in WP-SpamFree Anti-Spam WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Popup by Supsystic WordPress plugin vulnerable to Cross-Site Request Forgery

Please follow and like us:

Piergiorgio Venuti

Stored Cross-Site Scripting vulnerability in User Login Log WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Cross-Site Request Forgery & Cross-Site Scripting in Contact Form Manager WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Stored Cross-Site Scripting vulnerability in Contact Form WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Remote file upload vulnerability in WordPress Plugin Mobile App Native 3.0

Please follow and like us:

Piergiorgio Venuti

Cross-Site Request Forgery in WordPress Press This function allows DoS

Please follow and like us:

Alessandro Stesi

Persistent Cross-Site Scripting in the WordPress NewStatPress plugin

Please follow and like us:

Alessandro Stesi

Cross-Site Request Forgery in Atahualpa WordPress Theme

Please follow and like us:

Alessandro Stesi

Cross-Site Scripting in Magic Fields 1 WordPress Plugin

Please follow and like us:

Alessandro Stesi

Cross-Site Scripting in Google Analytics Dashboard WordPress Plugin

Please follow and like us:

Alessandro Stesi

WordPress Adminer plugin allows public (local) database login

Please follow and like us:

Alessandro Stesi

Cross-Site Request Forgery in WordPress Download Manager Plugin

Please follow and like us:

Alessandro Stesi

Simple Ads Manager WordPress plugin unauthenticated PHP Object injection vulnerability

Please follow and like us:

Alessandro Stesi

Cross-Site Request Forgery in Global Content Blocks WordPress Plugin

Please follow and like us:

Alessandro Stesi

Cross-Site Request Forgery in File Manager WordPress plugin

Please follow and like us:

Alessandro Stesi

Cross-Site Scripting vulnerability in WP-Filebase Download Manager WordPress Plugin

Please follow and like us:

Alessandro Stesi

Admin Custom Login WordPress plugin custom login page affected by persistent Cross-Site Scripting

Please follow and like us:

Alessandro Stesi

Admin Custom Login WordPress plugin affected by persistent Cross-Site Scripting via Logo URL field

Please follow and like us:

Alessandro Stesi

Analytics Stats Counter Statistics WordPress Plugin unauthenticated PHP Object injection vulnerability

Please follow and like us:

Alessandro Stesi

WordPress Plugin Kama Click Counter 3.4.9 – Blind SQL Injection

Please follow and like us:

Alessandro Stesi

WordPress Plugin Easy Table 1.6 – Persistent Cross-Site Scripting

Please follow and like us:

Alessandro Stesi

Persistent Cross-Site Scripting vulnerability in User Access Manager WordPress Plugin

Please follow and like us:

Alessandro Stesi

Multiple blind SQL injection vulnerabilities in FormBuilder WordPress Plugin

Please follow and like us:

Alessandro Stesi

Cross-Site Request Forgery vulnerability in FormBuilder WordPress Plugin allows plugin permissions modification

Please follow and like us:

Alessandro Stesi

CMS Commander Client WordPress Plugin unauthenticated PHP Object injection vulnerability

Please follow and like us:

Alessandro Stesi

Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

Please follow and like us:

Alessandro Stesi

New exploit for new vulnerability in WordPress Plugin + tutorial

Please follow and like us:

Alessandro Stesi

Nginx (Debian-based + Gentoo distros) – Root Privilege Escalation [CVE-2016-1247 UPDATE]

Please follow and like us:

Alessandro Stesi

Multiple vulnerabilities in cPanel <= 60.0.34

Please follow and like us:

Alessandro Stesi

Stop User Enumeration does not stop user enumeration (WordPress plugin)

Please follow and like us:

Alessandro Stesi

Zend Framework / zend-mail < 2.4.11 Remote Code Execution (CVE-2016-10034)

Please follow and like us:

Piergiorgio Venuti

MySQL / MariaDB / PerconaDB – Privilege Escalation / Race Condition Exploit [CVE-2016-6663 / OCVE-2016-5616]

Please follow and like us:

Piergiorgio Venuti

Cross-Site Scripting in Check Email WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Cross-Site Scripting in All In One WP Security & Firewall WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Nginx (Debian-based distros) – Root Privilege Escalation Vulnerability (CVE-2016-1247)

Please follow and like us:

Piergiorgio Venuti

Stored Cross-Site Scripting vulnerability in 404 to 301 WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Cross-Site Scripting in Calendar WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Cross-Site Scripting vulnerability in Caldera Forms WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

Cross-Site Scripting vulnerability in Quotes Collection WordPress Plugin

Please follow and like us:

Piergiorgio Venuti

MySQL / MariaDB / PerconaDB – Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )

Please follow and like us:

Piergiorgio Venuti

[oss-security] CVE request:Lynx invalid URL parsing with ‘?’

Please follow and like us:

Subscribe via RSS

More Articles…

Categories …

Tags

Security feeds

Customers

Newsletter