IP spoofing and Ingress Filtering

TLP:Public IP spoofing and Ingress Filtering We have been seeing a lot of spoofed source…

Decoy Scans – The Reverse IP – The Squash

TLP: Public Decoy Scans – The Reverse IP – The Squash Everyone can agree that…

Hackers take advantage of unsupported software

If your version of any software system is no longer supported, you are putting your…

Microsoft’s Outlook email app is crashing suddenly for people worldwide – FIX

Microsoft’s Outlook email app for Windows is crashing at launch for a large number of…

Nmap Decoy Scans – The Hamburger

TLP: Public Nmap Decoy Scans – The Hamburger Hackers are using the nmap -D option…

Common incoming TCP/UDP hacker scans against your firewall

TLP:Public Common TCP and UDP port scans that people see against their firewalls. Since March…

The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking

Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015…

Payment Tenders With Adept Enterprise®

Adept Enterprise ® has supported multiple tenders for payment transactions for over 16 years, for…