Skip to content
Close
CERTStation Blog CERTStation Blog

Cyber Security Dashboard

Sunday, May 11, 2025
Menu
  • Home
  • Products
  • Blog
  • Contact Us
Search
CERTStation Blog CERTStation Blog

Cyber Security Dashboard

  • Home
  • Products
  • Blog
  • Contact Us

Month: May 2019

  • Home
  • 2019
  • May
  • Page 5

Israel Launches Airstrike in Response to Cyberattack

By CertX May 7, 2019May 7, 2019
Cyber Crime

According to the Israel Defense Force, Hamas launched a cyberattack over the weekend, to which it Israel responded with an airstrike. It’s thought to be the first time that a military has reacted with physical violence in real time against a cyberattack Ian Thornton-Trump, security head at AmTrust Europe, told Forbes that Israel Continue Reading

Remote Code Execution Vulnerability Detected in PrinterLogic

By CertX May 7, 2019May 7, 2019
Vulnerability Alerts

Researchers at Sygnia Consulting security have found that flaws in the PrinterLogic Print Management software could let an invader perform code remotely on endpoints. The key problem is that the software does not authenticate SSL and software update certificates, which could let an invader reconfigure the software. Additionally, the PrinterLogic Continue Reading

Cybercriminals Wipe Git Repositories to Pay Ransom

By CertX May 6, 2019May 6, 2019
Cyber Crime

Programmers are said to have been affected by ransomware that apparently smears their Git repositories’ commits, replacing them with a ransom note challenging Bitcoin. An extraordinarily high number of developers have complained online about the impacts of the software foul, with the repos affected being hosted across a number of Continue Reading

Difference Between Information Security and Cybersecurity

By CertX May 3, 2019May 3, 2019
Miscellaneous

In today’s complex tech-driven world, security has assumed utmost importance. Cyber security and information security are typically used as synonyms in security terminology, creating a lot of misunderstanding among security professionals. So, here we would like to clear the misconception between cyber security and information security.

Risk of Attacks Rises Due to Flaws in Component of SAP Application

By CertX May 3, 2019May 3, 2019
Vulnerability Alerts

Companies using SAP business apps have been cautioned that the risk of attacks concerning some old configuration issues has augmented after scholars released proof-of-concept (PoC) activities. SAP Message Server and SAP Gateway use an access control list (ACL) to stipulate which IP addresses are permitted to record application servers. If Continue Reading

Posts navigation

Previous 1 … 4 5 6 Next

Categories

  • Company News22
  • Cyber Crime191
  • IoT1
  • Malware61
  • Miscellaneous131
  • SCADA3
  • Vulnerability Alerts275

Malware

Malware

Archives

CERTStation’s services and products are not endorsed, authorized or sponsored by,nor affiliated with, Carnegie Mellon University, the Software Engineering Institute or the CERT Coordination Center. – An Arpatech Venture.

Useful Links

  • Home
  • Products
  • Blog
  • Contact Us

Connect With Us

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

Email News Letter

  • TMA Subscription
© 2019 Certstation. All rights reserved.