Location via proxy:   
[Report a bug]   [Manage cookies]                




Image 1 Cellular Infrastructure Found to Have 119 Vulnerabilities

Posted: 2025/02/20
Source: Cellular Security
Tag(s): Headline, Privacy, Phone, Flaw
Image 1 Two Arrested after Pensioner Scammed out of Six-Figure Crypto Nest Egg

Posted: 2025/02/20
Source: The Register
Tag(s): Headline, Britain, Cybercrime, Fraud, Cryptography, Scotland
Image 1 Trump Is Putting Us on the Wrong Side of History, Again

Posted: 2025/02/20
Source: CNN
Tag(s): Headline, Government, USA, Russia, Fraud, Ukraine
Image 1 Google's New AI Generates Hypotheses for Researchers

Posted: 2025/02/20
Source: ars technica
Tag(s): Headline, Botnet, Google, Science
Image 1 Critical Flaws in Mongoose Library Expose MongoDB to Data Thieves, Code Execution

Posted: 2025/02/20
Source: The Register
Tag(s): Headline, Hacker, Database, Data Loss, Flaw
Image 1 AI Cracks Superbug Problem in Two Days That Took Scientists Years

Posted: 2025/02/20
Source: BBC News UK
Tag(s): Headline, Botnet, Science
Image 1 Microsoft Patches Exploited Power Pages Vulnerability

Posted: 2025/02/20
Source: Security Week
Tag(s): Headline, Microsoft, Flaw, Patch
Image 1 Microsoft Claims Quantum Breakthrough with Majorana 1 Computer Chip

Posted: 2025/02/20
Source: SC Magazine
Tag(s): Headline, Microsoft, Science
Image 1 CISA, FBI Warn of China-Linked Ghost Ransomware Attacks

Posted: 2025/02/20
Source: Security Week
Tag(s): Headline, Government, Malware, USA, China, Cybercrime, Cyberwar, FBI, Cryptography
Image 1 Medusa Ransomware Gang Demands $2M from UK Private Health Services Provider

Posted: 2025/02/20
Source: The Register
Tag(s): Headline, Privacy, Malware, Britain, Cybercrime, Data Loss, Cryptography
Image 1 Cellular Infrastructure Found to Have 119 Vulnerabilities

Posted: 2025/02/20
Source: Cellular Security
Tag(s): Headline, Privacy, Phone, Flaw
Image 1 Two Arrested after Pensioner Scammed out of Six-Figure Crypto Nest Egg

Posted: 2025/02/20
Source: The Register
Tag(s): Headline, Britain, Cybercrime, Fraud, Cryptography, Scotland
Image 1 Trump Is Putting Us on the Wrong Side of History, Again

Posted: 2025/02/20
Source: CNN
Tag(s): Headline, Government, USA, Russia, Fraud, Ukraine
Image 1 Google's New AI Generates Hypotheses for Researchers

Posted: 2025/02/20
Source: ars technica
Tag(s): Headline, Botnet, Google, Science
Image 1 Critical Flaws in Mongoose Library Expose MongoDB to Data Thieves, Code Execution

Posted: 2025/02/20
Source: The Register
Tag(s): Headline, Hacker, Database, Data Loss, Flaw
Image 1 AI Cracks Superbug Problem in Two Days That Took Scientists Years

Posted: 2025/02/20
Source: BBC News UK
Tag(s): Headline, Botnet, Science
Image 1 Microsoft Patches Exploited Power Pages Vulnerability

Posted: 2025/02/20
Source: Security Week
Tag(s): Headline, Microsoft, Flaw, Patch
Image 1 Microsoft Claims Quantum Breakthrough with Majorana 1 Computer Chip

Posted: 2025/02/20
Source: SC Magazine
Tag(s): Headline, Microsoft, Science
Image 1 CISA, FBI Warn of China-Linked Ghost Ransomware Attacks

Posted: 2025/02/20
Source: Security Week
Tag(s): Headline, Government, Malware, USA, China, Cybercrime, Cyberwar, FBI, Cryptography
Image 1 Medusa Ransomware Gang Demands $2M from UK Private Health Services Provider

Posted: 2025/02/20
Source: The Register
Tag(s): Headline, Privacy, Malware, Britain, Cybercrime, Data Loss, Cryptography

Storm Watch ()

2025-02-20: 14 news articles added
2025-02-20: 23 files added
2025-01-22: 1 voting poll added

2025-02-14 (1739491200)

Sometimes mitigating vulnerabilities means updating to bleeding edge code. And sometimes, those updates have issues. The downtime this morning was a result of that. Things should be stable rest of day.


2025-02-05 (1738713600)

Popularity can be a curse. Currently debugging a memory leak of about 750 bytes per request on average which leads to many gigs of ram leaking over about 12 hours. You may see 404s occasionally as the daemons are restarted while debugging. Yay overly complicated massive dependency-requiring frameworks with a million moving layers. Maybe a rewrite of the code base in awk tied to a raw openssl binding on tcp/443 will calm the nerves. It certainly would be easier to debug.

...
[ View Full Changelog ]


Polls ()

When it comes to security tools, there are quite a few out there. We do not have room to list them all, but we can list some and get a feel for what has caused the largest impact.


Most impactful security tool of all time from this short list?

AnswersResults
Nmap — Recon is where you start.42%
Metasploit — Because, well, Metasploit.28%
Tcpdump/Libpcap/Wireshark — Show me the bits.14%
Sqlmap — All the databases will be mine!14%
John the Ripper — I enjoy cracking all the passwords.0%
OSSEC — Host security still matters.0%
Storm Watch ()

2025-02-20: 14 news articles added
2025-02-20: 23 files added
2025-01-22: 1 voting poll added

2025-02-14 (1739491200)

Sometimes mitigating vulnerabilities means updating to bleeding edge code. And sometimes, those updates have issues. The downtime this morning was a result of that. Things should be stable rest of day.


2025-02-05 (1738713600)

Popularity can be a curse. Currently debugging a memory leak of about 750 bytes per request on average which leads to many gigs of ram leaking over about 12 hours. You may see 404s occasionally as the daemons are restarted while debugging. Yay overly complicated massive dependency-requiring frameworks with a million moving layers. Maybe a rewrite of the code base in awk tied to a raw openssl binding on tcp/443 will calm the nerves. It certainly would be easier to debug.

...
[ View Full Changelog ]
Polls ()

When it comes to security tools, there are quite a few out there. We do not have room to list them all, but we can list some and get a feel for what has caused the largest impact.


Most impactful security tool of all time from this short list?

AnswersResults
Nmap — Recon is where you start.42%
Metasploit — Because, well, Metasploit.28%
Tcpdump/Libpcap/Wireshark — Show me the bits.14%
Sqlmap — All the databases will be mine!14%
John the Ripper — I enjoy cracking all the passwords.0%
OSSEC — Host security still matters.0%
 About | Terms | Copyright | Privacy | BlueSky | X | Mastodon
 © 2024 - 2025
All Rights Reserved Packet Storm Security, LLC
Hosting provided by: RokaSecurity