Explore >> Select a destination


You are here

www.komodosec.com
| | mandconsulting.ca
10.2 parsecs away

Travel
| | Dominik Penner of Mand Consulting Group discovered that Maltego versions 4.2.11 and below are vulnerable to XML external entity (XXE) injection via processing of MTZ (config) and MTGL (graph) files
| | www.martinvigo.com
11.2 parsecs away

Travel
| | Today, LastPass issued a security notice on their blog explaining that they detected some suspicious activity on their network. They believe that "LastPass account email addresses, password reminders, server per user salts, and authentication hashes were compromised" but also that the encrypted passwords (the vault) was not accessed. What does all this reallymean? I found ...
| | thehackernews.com
8.3 parsecs away

Travel
| | Millions of malicious "imageless" containers have been planted on Docker Hub over the past 5 years in multiple cybercriminal campaigns.
| | initialcommit.com
30.4 parsecs away

Travel
| Diving into the world of Hash Tables and understanding the underlying mechanics is extremely interesting, and very rewarding. So let's get into it and get started from the beginning. They are used commonly in algorithm design.