HACKMAGEDDON

Information Security Timelines and Statistics

  • About
  • Submit An Attack
  • Cyber Attacks Timeline
    • 2011 Cyber Attacks Timeline Master Index
    • 2012 Cyber Attacks Timeline Master Index
    • 2013 Cyber Attacks Timeline Master Index
    • 2014 Cyber Attacks Timeline Master Index
    • 2015 Cyber Attacks Timelines Master Index
    • 2017 Master Table
    • 2018 Master Table
  • Cyber Attacks Statistics

Firewalls

Security 

Next Generation Firewalls and Web Applications Firewall Q&A

October 7, 2011 4 Comments Cross-Site Scripting, Firewalls, IPS, Next Generation Firewall, NGF, Payment Card Industry Data Security Standard, SQL Injection, Stateful firewall, WAF, Web Application Firewall

If I ask to an average skilled information security professional what a firewall is, I am pretty sure that he

Read more
Security 

TCP Split Handshake: Why Cisco ASA is not susceptible

May 12, 2011 6 Comments Access control list, Cisco, Cisco ASA, Cisco Systems, Firewalls, NSS Labs, TCP Split Handshake

As I told yesterday, I was not very satisfied with the updated NSS remediation guide concerning the TCP Split Handshake

Read more
Security 

TCP Split Handshake: The (Never)ending Story…

May 12, 2011 2 Comments Cisco Systems, Firewalls, Fortinet, NSS Labs, TCP Split Handshake

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible On May, the 9th 2011, nearly in contemporary, Cisco

Read more
Security 

Other Considerations On TCP Split Handshake

April 21, 2011 3 Comments Cisco, Firewalls, Fortinet, Juniper Networks, McAfee, Microsoft, NSS Labs, Palo Alto Networks, Sonicwall, Stonesoft, TCP Split Handshake, Watchguard

The storm unleashed by NSS Labs test for the TCP split handshake attack which affected 5 firewall vendors  is far

Read more
Security 

TCP Split Handshake Attack Explained

April 17, 2011October 1, 2018 Dot Nerk 9 Comments Checkpoint, Cisco, Firewalls, Fortinet, Juniper, Network security, NSS Labs, Palo Alto, Security, Sonicwall, TCP Split Handshake

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible Update May 11: The Never Ending Story Update April

Read more

Major Crypto Hacks

Browse the chart of the main crypto hacks

Make a Donation

Compiling the timelines and statistics it's an extremely time (and family) consuming activity. Help me to provide this service to the infosec community, keeping the Timelines and Stats updated!

Consider to make a donation!

Follow me on Twitter

My Tweets

Subscribe

Enter your email address to subscribe and receive notifications of new posts by email.

Join 5,601 other subscribers

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright © 2019 HACKMAGEDDON. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.