Protection against hacker attacks on deep learning models
Like anything else in computing, deep learning models can be hacked. The IBM team has identified threats and developed techniques to protect AI models called deep generative models (DGMs). DGM models are an emerging AI technology that can synthesize data from complex, high-dimensional arrays, be…
Research: over 2 million Microsoft web servers are running vulnerable versions of IIS
CyberNews researchers said they have identified over 2 million web servers running on outdated, out-of-service and vulnerable Microsoft Internet Information Services (IIS). Since outdated versions of IIS are no longer supported by Microsoft, the researchers said they could easily compromise them, inject all sorts of…
How hackers spoof DNS requests by poisoning the cache
Domain Name Server (DNS) spoofing is a cyberattack in which an attacker directs the victim’s traffic to a malicious site (instead of a legitimate IP address). Attackers use DNS cache poisoning to intercept Internet traffic and steal credentials or confidential information. DNS cache poisoning and…
KRACK Attack Author Reveals 12 Critical Vulnerabilities Of Popular Wireless Devices
KRACK (Key Reinstallation Attacks) attacks were reported several years ago. The so-called tools that allow you to exploit critical vulnerabilities in the WPA2 protocol, which are considered quite reliable. KRACK allows you to bypass security and listen to traffic in a wireless network at the…
Layer 7 DDoS attacks – protecting sites
Layer 7 DDoS attacks (application layer) are the easiest way to disable a website and harm your business. Unlike attacks at other tiers, where a powerful stream of network traffic must be set up to fail a site, attacks at tier 7 can proceed without…
GitHub launched static analysis for code vulnerabilities
After extensive testing, GitHub made it publicly available to scan code for vulnerabilities. Anyone can run a scanner on their own repository and find vulnerabilities before they go to production. The scanner works for repositories in C, C ++, C #, JavaScript, TypeScript, Python and…
Security Cheat Sheets: Node.js
Quite a lot has already been said about the popularity of NodeJS. The increase in the number of applications is obvious – NodeJS is quite easy to learn, it has a huge number of libraries, as well as a dynamically developing ecosystem. We made recommendations…
Network Security and Availability in 2019: how it was
TCP SYN-ACK amplification and other protocols The growth of the IoT market, among other things, means that attackers can exploit vulnerable devices if they wish, creating a significant attack bandwidth – as happened in the middle of the year when the WSDD protocol was used…
Pitfalls of GDPR
The main mistake in the implementation of GDPR is to rely on the strength and resources of only one person. A common practice is to expect independent work on the Rules from a lawyer. In such a situation, if he doesn’t have enough serious position…
Complex commercial products for Kubernetes Security
Aqua security Website: www.aquasec.com License: commercial This commercial tool is designed for containers and cloud workloads. It provides: Image scanning integrated with the container registry or CI / CD pipeline; Runtime protection with the search for changes in containers and other suspicious activity; Native container…
Service
Categories
- DEVELOPMENT (103)
- DEVOPS (53)
- FRAMEWORKS (26)
- IT (25)
- QA (14)
- SECURITY (13)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)