Profile cover photo
Profile photo
Entersoft Security
2 followers -
Entersoft - Application Security Simplified
Entersoft - Application Security Simplified

2 followers
About
Posts

Post has attachment
http://blog.entersoftsecurity.com/entersoft-vulnerability-overview-insufficient-attack-protection

It is natural behaviour for most attackers targeting an application to perform extensive research about the application, its services and categories of users accessing the application. The research usually starts with an ‘information gathering’ phase which includes collecting information about the application stack and usernames that are available to any random user who has access to the application, in addition to observing contact-us forms’ structures.
#vulnerabilityattack #insufficientattackprotection #insufficienattack #cyberattack #cybersecurity
Add a comment...

Post has attachment
http://blog.entersoftsecurity.com/petya-ransomeware-an-overview

It is a piece of code/software which infects any computer with user intervention and encrypts all the system information.

#ransomeware #petyaransomeware #ransomewareattack #cyberattack #cybersecurity
Petya Ransomeware: An Overview
Petya Ransomeware: An Overview
blog.entersoftsecurity.com
Add a comment...

Post has attachment
http://blog.entersoftsecurity.com/new-vulnerability-raspberry-pi-malware-mines-cryptocurrency


A new malware called Linux.MulDrop.14 is targeting Raspberry Pi computers. In a separate posting, the site examines two different Pi-based trojans including Linux.MulDrop.14.
#LinuxMulDrop14 #RaspberryPi #Pi-basedtrojans #trojans #malwareattack #malwareminescryptocurrency
Add a comment...

Post has attachment

Post has attachment

Post has attachment

Post has attachment

Post has attachment

Post has attachment

Post has attachment
Wait while more posts are being loaded