Why should you worry about DNS attacks?

Why should you worry about DNS attacks? https://ift.tt/3imhFPU Domain Name System (DNS) is a very basic protocol and service that enables Internet users and network devices to discover websites using human-readable hostnames instead of numeric IP addresses. This article provides a detailed explanation of how DNS works. If the DNS service is attacked or doesn’t […]

Defending Exchange servers under attack

Defending Exchange servers under attack https://ift.tt/3fNTc3M Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, as well as highly privileged accounts that attackers attempt […]

Docker Desktop danger discovered, patch now

Docker Desktop danger discovered, patch now https://ift.tt/3d6f4GF Docker has fixed a vulnerability that could have allowed an attacker to gain control of a Windows system using its service. The bug, discovered by Ceri Coburn, a researcher at security consultancy Pen Test Partners, exposed Docker for Windows to privilege elevation. Docker is a container system that […]

Identifying Let’s Encrypt Revoked Certificates

Identifying Let’s Encrypt Revoked Certificates https://ift.tt/2VPS8Wj Let’s Encrypt is a free, automated, open certificate authority (CA) run for the public’s benefit as a service from the Internet Security Research Group (ISRG). It provides free digital certificates to enable HTTPS (SSL/TLS) for websites via user-friendly means. Earlier this week, Let’s Encrypt announced that a bug in its validation code forced it to revoke more […]

(IN)SECURE Magazine issue 65 released

(IN)SECURE Magazine issue 65 released https://ift.tt/2HgdR1c (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 65 has been released today. It’s a free download, no registration required. Table of contents A case for establishing a common weakness enumeration for hardware security Things to keep in mind […]