Archive for tag: cyber-attacks

The New Target for State-Sponsored Cyber Attacks: Applications

December 22, 2014

By Jeff Williams Skilled hackers are now using simple web application vulnerabilities like SQL Injection to take over database servers. Are you prepared to defend against this new type of threat actor? Historically, state-sponsored hackers have used memory corruption vulnerabilities like buffer overflows to create malware for their attacks, targeting operating systems and appliances written […]

Visit Us On FacebookVisit Us On TwitterVisit Us On LinkedinVisit Us On Google PlusCheck Our Feed