Category: Software
Software
IP spoofing and Ingress Filtering
TLP:Public IP spoofing and Ingress Filtering We have been seeing a lot of spoofed source…
Decoy Scans – The Reverse IP – The Squash
TLP: Public Decoy Scans – The Reverse IP – The Squash Everyone can agree that…
Hackers take advantage of unsupported software
If your version of any software system is no longer supported, you are putting your…
Microsoft’s Outlook email app is crashing suddenly for people worldwide – FIX
Microsoft’s Outlook email app for Windows is crashing at launch for a large number of…
Nmap Decoy Scans – The Hamburger
TLP: Public Nmap Decoy Scans – The Hamburger Hackers are using the nmap -D option…
Common incoming TCP/UDP hacker scans against your firewall
TLP:Public Common TCP and UDP port scans that people see against their firewalls. Since March…
The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking
Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015…
Payment Tenders With Adept Enterprise®
Adept Enterprise ® has supported multiple tenders for payment transactions for over 16 years, for…