Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

TCP Split Handshake Attack Explained

  • Post author:Dot Nerk
  • Post last modified:October 1, 2018
  • Post category:Security
  • Post comments:9 Comments
  • Reading time:8 mins read
  • Post published:April 17, 2011

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible Update May 11: The Never Ending Story Update April…

Continue ReadingTCP Split Handshake Attack Explained
Read more about the article The Last Infosec Week in Pills

The Last Infosec Week in Pills

  • Post author:Paolo Passeri
  • Post last modified:January 16, 2016
  • Post category:News/Security
  • Post comments:0 Comments
  • Reading time:6 mins read
  • Post published:January 14, 2016

Here's another selection of the main security events of the past few days. In case you missed them, or in…

Continue ReadingThe Last Infosec Week in Pills
Read more about the article It’s Still a World of Botnets and Cyber Attacks

It’s Still a World of Botnets and Cyber Attacks

  • Post author:Paolo Passeri
  • Post last modified:October 6, 2015
  • Post category:Botnets/Cyberwar/Security
  • Post comments:2 Comments
  • Reading time:10 mins read
  • Post published:August 24, 2015

03/09/2015 Updated with the Akamai Attack Map Big data analysis has become a very powerful weapon in the hands of…

Continue ReadingIt’s Still a World of Botnets and Cyber Attacks

Browsing Security Predictions for 2012

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:January 8, 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…

Continue ReadingBrowsing Security Predictions for 2012

What Security Vendors Said One Year Ago…

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:January 10, 2012

I did not resist, so after publishing the summary of Security Predictions for 2012, I checked out what security vendors…

Continue ReadingWhat Security Vendors Said One Year Ago…

Crime As A Self Service

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:February 3, 2012

One of the most visionary information security predictions for 2012, was the one issued by Fortinet which defined the term…

Continue ReadingCrime As A Self Service

Browsing Security Predictions for 2013

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:December 26, 2012

The period between November and December is particularly interesting for the Infosec community, since nearly all the main security vendors…

Continue ReadingBrowsing Security Predictions for 2013

TCP Split Handshake: The (Never)ending Story…

  • Post author:
  • Post last modified:May 12, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:May 12, 2011

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible On May, the 9th 2011, nearly in contemporary, Cisco…

Continue ReadingTCP Split Handshake: The (Never)ending Story…

Some Random Thoughts On The Security Market

  • Post author:
  • Post last modified:May 10, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 10, 2011

The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts…

Continue ReadingSome Random Thoughts On The Security Market

Other Considerations On TCP Split Handshake

  • Post author:
  • Post last modified:April 21, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:5 mins read
  • Post published:April 21, 2011

The storm unleashed by NSS Labs test for the TCP split handshake attack which affected 5 firewall vendors  is far…

Continue ReadingOther Considerations On TCP Split Handshake
  • 1
  • 2
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM