

Overview FortiOS SSL-VPN doesn't validate HTTP requests properly, leading to an overflow...
General information Two RCEs exist and three vectors are being discussed online (one of...
This vulnerability can allow an attacker to, if exploited on a server, gain complete...
At Holm Security, we provide solutions for vulnerability assessment. In meetings with our customers, we sometimes discuss previous incidents that could've...
The Delivery Mechanism This part of the cyber weapon ensures it hits its target - or reaches the right client, hardware, or network. The delivery can be done...
Today, not all systems are running yet and they estimated that it may take several months before they are up and running again. The attack probably started as...
According to Stefan Thelberg, security expert and CEO at Holm Security, the 1177 leak could have easily been avoided if basic security measures had been in...
1. Simply a Programming Error? If you get a developer to set up a back door. It can be so subtle, you might mistake it for a programming error. Occasionally,...