TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 16, 2017
Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 20 Oct 2017 13:29:23 +0000
Various forms of fuzzing techniques that search for vulnerabilities in software programs have been around for several decades, but it can a tedious task, especially when looking at an entire enterprise application. Earlier this week, Zero Day Initiative (ZDI) vulnerability researcher Abdul-Aziz Hariri published a blog detailing how to fuzz the image conversion feature of…



In spite of a rapidly evolving landscape, data breaches remain among the most common and damaging cyber-threats facing organizations today. As digital transformation efforts take hold, so the corporate attacks surface grows, offering more opportunities for the bad guys to take aim at highly prized IP and customer data. They also have the element of…
Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that entrepreneurs, as well as criminals are continually searching for “the next big thing” to either benefit or to blight our…