search expand
Skip to content
Security Zap

Security Zap

Cyber Security Done Right – Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.

  • Cybersecurity
    • Threat
    • Tools
    • News
  • Tech
  • Business
  • Education
  • Home Tech

Category: Vulnerabilities

Vulnerabilities are the most important part of security. Discover and fix the most dangerous vulnerabilities

eset antivirus

ESET Free Purchase Vulnerability

Posted on May 19, 2015January 18, 2016 by Security Zap

ESET vulnerability has been uncovered by Egyptian geeks. This authentication bug allowed a security researcher to generate millions of valid licenses for NOD 32 antivirus…

Posted in VulnerabilitiesTagged antivirus bug, application hacking, authentication bypassLeave a Comment on ESET Free Purchase Vulnerability
venom vulnerability

VENOM Vulnerability

Posted on May 18, 2015February 26, 2024 by Security Zap

What is Venom Vulnerability? VIRTUALIZED ENVIRONMENT NEGLECTED OPERATIONS MANIPULATION or VENOM vulnerability has been uncovered by crowdstrike. According to senior security researcher Jason Geffner this…

Posted in News, Security News, VulnerabilitiesTagged data center, floppy disk controller, venom vulnerabilityLeave a Comment on VENOM Vulnerability
scada plc pls

Vulnerabilities in Industrial Control Systems – SCADA

Posted on May 14, 2015May 14, 2015 by Security Zap

Industrial Control Systems (ICS), operate the global industrial infrastructures, such as pipelines, nuclear stations, oil, electricity and much more. ICS comprises Supervisory Control and Data…

Posted in VulnerabilitiesTagged industrial control systems, plc, pls, scada, vulnerabilitiesLeave a Comment on Vulnerabilities in Industrial Control Systems – SCADA

Posts navigation

Previous 1 … 19 20

Search

Recent Posts

  • Deception Technology: How Fidelis Security Helps Enterprises Turn the Tables on Attackers
  • 4 Benefits of Using an AI Text Humanizer
  • Building a Stronger Data Loss Prevention Strategy Through Risk Assessment
  • Beyond Break-Fix: How Modern Outsourced IT Support Drives Business Growth
  • Advantages and Drawbacks of Single Page Applications (SPAs)
security zap logo

All Rights Reserved. © Copyrights 2020 SecurityZap.com

Pages

  • About Us
  • Privacy Policy and Terms of Service
  • Sitemap
  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us