智能运维
-
How to Protect Your Apple Devices From 14 0-Day Vulnerabilities in iOS, iPadOS, and macOS
On SEP 12th, tech giant Apple rolled out security updates for their iOS, iPadOS, and macOS platforms to protect your Apple devices from 14 0-day vulnerabilities in iOS, iPadOS, and macOS. Apple didn’…
-
How to Fix CVE-2022-3602 and CVE-2022-3786- The Two New Buffer Overflow Vulnerabilities in OpenSSL
On 1st November, OpenSSL published an advisory that talks about two high-severity vulnerabilities in its software library. The vulnerabilities in OpenSSL allow attackers to carry out buffer…
-
How to Protect Your WordPress Website From Redirect Malware Campaign
Sucuri, a well-known website security firm, revealed its studies about a unique search engine poisoning technique that lets attackers increase the authority of the attacker’s sit…
-
How to Patch the 5 New Vulnerabilities in VMware Workspace ONE Assist
VMWare published an advisory on 8th Nov 2022 in which it disclosed 5 new vulnerabilities in VMWare Workspace ONE Assist. Out of the five vulnerabilities, three are rated Critical, and two a…
-
What is Lockbit 3.0? Who is Behind It? How to Protect From Lockbit Ransomware?
As crime grows in the digital world, cyber criminals try to make their malware more sophisticated. Ransomware is one such malware that tries to lock the victim’s data by encrypting and making t…
-
使用Docker部署Tomcat项目
1.提交新项目至网络服务器。所使用的是eclipse提前准备好的一个Tomcat趣味测试(docker容器里并没有数据库系统,再次弄数据库系统不便,因此之前的将就用),便是表明一个图片,跑起来长这个样。随后把它导出来成wa…
-
What is ViperSoftX Malware? How to Protect from ViperSoftX Malware?
Google Chrome is a popular open-source browser used to access the internet and run multiple web applications; It is one of the most trustable browsing platforms all around the world. Even so, there a…
-
How to Avoid Being a Social Engineering Victim of Pig Butchering Cryptocurrency Fraud
As Crypto market grows it encourages threat actors to commit cyber crime. This leads security firms to be more vigilant about the emerging threats to protect their clients and their own infrastructur…
-
How to Prepare for the eCTHPv2 Certification?
Hello everyone, I recently completed my eLearnSecurity Certified Threat Hunting Professional Certification (eCTHPv2). While I was preparing for the exam, I realized not many resources were available …
-
How to Fix the 3 New Vulnerabilities in Lenovo UEFI?
Martin Smolár, a security researcher from ESET, has disclosed 3 new vulnerabilities in Lenovo UEFI. The vulnerability is impacting multiple Lenovo consumer Notebook models like Yoga, IdeaPad, and Thi…