Hacker attacks & exploits

Hacker attacks & exploits

Spring4Shell: Zero-Day Vulnerability in Spring Framework

Holm Security is sharing the following vulnerability update in relation to Spring4Shell. The...

Apr 1, 2022

Hacker attacks & exploits

How to remediate the Log4j 2 vulnerability

On Friday the 10th of December, a new widespread vulnerability impacting the Apache Log4j version 2...

Dec 14, 2021

Hacker attacks & exploits

Are you protected against malware attacks?

Imagine this, one day you discover that your website is being used to propagate malware. Google...

Oct 3, 2019

Hacker attacks & exploits

How a cyber weapon is made

What is the difference between an ordinary damaging code and an advanced cyber weapon, and exactly...

Aug 29, 2019

Hacker attacks & exploits

How hackers use legitimate-looking domains to attack you

Hackers use multiple techniques of manipulation to trick you into opening a malicious website. In...

Jun 17, 2019

Hacker attacks & exploits

The Hydro-attack cost 350 million – this is how it happened!

On March 19, the Norwegian multinational company Norsk Hydro detected abnormal activity in their...

May 22, 2019

Hacker attacks & exploits

The 1177 leak could have easily been avoided

Recently Sweden experienced its most extensive data leak in history. February 18th the Swedish...

Mar 8, 2019

Hacker attacks & exploits

10 different ways an attacker can put in backdoors in IT systems

Understanding an attacker and the various methods used for attempting to access or modify systems...

Oct 2, 2018

Hacker attacks & exploits

Vulnerability in Episerver detected by Holm Security

Holm Security’s security team is working hard to detect new vulnerabilities in widely used CMS...

Mar 23, 2018
❮ Go back