search expand
Skip to content
Security Zap

Security Zap

Cyber Security Done Right – Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.

  • Cybersecurity
    • Threat
    • Tools
    • News
  • Tech
  • Business
  • Education
  • Home Tech

Category: Threat

venom vulnerability

VENOM Vulnerability

Posted on May 18, 2015February 26, 2024 by Security Zap

What is Venom Vulnerability? VIRTUALIZED ENVIRONMENT NEGLECTED OPERATIONS MANIPULATION or VENOM vulnerability has been uncovered by crowdstrike. According to senior security researcher Jason Geffner this…

Posted in News, Security News, VulnerabilitiesTagged data center, floppy disk controller, venom vulnerabilityLeave a Comment on VENOM Vulnerability
cyber attack

Cyber Attack on Bundestag

Posted on May 16, 2015February 26, 2024 by Security Zap

According to Spiegel the national parliament of Germany, Bundestag, has been targeted by a major cyber attack allowing unknown perpetrators to penetrate internal network. According to…

Posted in Cyber Attacks, News, Security NewsTagged bundestag, cyber attack, data breach, germany1 Comment on Cyber Attack on Bundestag
cyber space of iran

Cyberspace and Cyber Warfare Capabilities of Iran

Posted on May 14, 2015December 31, 2015 by Security Zap

Introduction Internet is probably the most valuable asset for billions of people all around the world. It plays key roles in our social life, governance,…

Posted in Cyber AttacksTagged cyber capabilities, cyber space of iran, cyber warfareLeave a Comment on Cyberspace and Cyber Warfare Capabilities of Iran
scada plc pls

Vulnerabilities in Industrial Control Systems – SCADA

Posted on May 14, 2015May 14, 2015 by Security Zap

Industrial Control Systems (ICS), operate the global industrial infrastructures, such as pipelines, nuclear stations, oil, electricity and much more. ICS comprises Supervisory Control and Data…

Posted in VulnerabilitiesTagged industrial control systems, plc, pls, scada, vulnerabilitiesLeave a Comment on Vulnerabilities in Industrial Control Systems – SCADA

Posts navigation

Previous 1 … 61 62

Search

Recent Posts

  • Deception Technology: How Fidelis Security Helps Enterprises Turn the Tables on Attackers
  • 4 Benefits of Using an AI Text Humanizer
  • Building a Stronger Data Loss Prevention Strategy Through Risk Assessment
  • Beyond Break-Fix: How Modern Outsourced IT Support Drives Business Growth
  • Advantages and Drawbacks of Single Page Applications (SPAs)
security zap logo

All Rights Reserved. © Copyrights 2020 SecurityZap.com

Pages

  • About Us
  • Privacy Policy and Terms of Service
  • Sitemap
  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us