Micro Focus Community
Micro Focus Community
  • Site
  • User
  • Site
  • Search
  • User
Micro Focus Community
  • Blogs
  • Ask & Explore
  • Community Guide
  •  

    Menu

    ×
  1. Welcome
  2. Application Delivery Management

      Application Delivery Management

      ×
    1. AccuRev
    2. Agile Manager
    3. ALM / Quality Center
    4. ALM Octane
    5. Business Process Testing
    6. Deployment Automation
    7. Dimensions CM
    8. Dimensions RM
    9. LoadRunner Cloud
    10. LoadRunner Enterprise
    11. LoadRunner Professional
    12. Micro Focus Connect
    13. Model-Based Testing
    14. Project and Portfolio Mgmt.
    15. PVCS Version Manager
    16. Release Control
    17. Requirements Management
    18. Service Virtualization
    19. Silk Central
    20. Silk Performer
    21. Silk Test
    22. StarTeam
    23. UFT Developer
    24. UFT Mobile
    25. UFT One
    26. ValueEdge Platform
  3. Application Modernization & Connectivity

      Application Modernization & Connectivity

      ×
    1. AMC-INTL
    2. ChangeMan SSM
    3. ChangeMan ZMF
    4. COBOL Analyzer
    5. Comparex
    6. Enterprise Analyzer
    7. Enterprise Developer
    8. Enterprise Server
    9. Enterprise Test Server
    10. Extend / AcuCOBOL
    11. Extra!
    12. Host Access for the Cloud
    13. Host Access Mgmt/Security Server
    14. Micro Focus and AWS Partnership
    15. Net Express / Server Express
    16. Network Virtualization
    17. OpenFusion
    18. Orbacus
    19. Orbix
    20. Reflection
    21. RM/COBOL
    22. Rumba
    23. StarTool
    24. Verastream
    25. VisiBroker
    26. Visual COBOL
  4. Information Management & Governance

      Information Management & Governance

      ×
    1. Content Manager
    2. ControlPoint
    3. Data Protector
    4. eDiscovery
    5. IDOL
    6. Retain
    7. Social Media Governance
    8. Storage Manager
    9. VM Explorer
  5. IT Operations Management

      IT Operations Management

      ×
    1. Aegis
    2. AppManager
    3. Asset Management
    4. Client Automation
    5. Data Center Automation
    6. Hybrid Cloud Management
    7. Network Operations Management (NNM and Network Automation)
    8. Operations Bridge
    9. Operations Center
    10. Operations Orchestration
    11. OPTIC (ITOM Platform)
    12. PlateSpin
    13. Robotic Process Automation
    14. Service Management Automation
    15. Service Request Center (SRC)
    16. Service Support Manager (SSM)
    17. SMA-Service Manager Suite
    18. SMAX Suite
    19. Solutions Business Manager
    20. Storage Operations Manager
    21. Universal Discovery & CMDB
  6. CyberRes

      CyberRes

      ×
    1. CyberRes User Group
    2. AD Bridge
    3. ArcSight
    4. File Analysis Suite for Data Discovery
    5. File Dynamics
    6. File Reporter
    7. Fortify
    8. Galaxy
    9. NetIQ Access Manager
    10. NetIQ Advanced Authentication
    11. NetIQ Change Guardian
    12. NetIQ Directory & Resource Administrator
    13. NetIQ eDirectory
    14. NetIQ Identity Governance/Administration
    15. NetIQ Identity Manager
    16. NetIQ LDAP Proxy
    17. NetIQ Privileged Account Manager
    18. NetIQ Risk Service
    19. NetIQ Secure API Manager
    20. NetIQ Secure Configuration Manager
    21. NetIQ SecureLogin
    22. NetIQ Security Solutions for IBM i
    23. NetIQ Self Service Password Reset
    24. NetIQ Validator
    25. NetIQ Group Policy Administrator
    26. SecureData
    27. SecureMail
    28. Sentinel
    29. Structured Data Manager
    30. Voltage Data Privacy and Protection
  7. Team Collaboration and Endpoint Management

      Team Collaboration and Endpoint Management

      ×
    1. Connected Backup
    2. Filr
    3. GroupWise Products
    4. iPrint
    5. Open Enterprise Server
    6. Vibe
    7. ZENworks
  8. Control Tower
  9. Micro Focus Marketplace
  10. Technical Insights Series
  • User
  • Site
  • Search
  • User
    CyberRes
    Community Home › CyberRes › CyberRes Research Blog

    CyberRes

    • Home
    • Blogs
    • News & Events
    • New

    Labels

    Application security 11
    Black Hat 3
    Data security and encryption 0
    Endpoint Management 0
    Fortify 13
    GDPR 1
    Identity & Access Mgmt 0
    OSINT 1
    OWASP 3
    Security Events 0
    Security Operations 0
    Static Analyzer 2
    Threat Intelligence 1
    Tools 2
    UEBA 0
    Vulnerabilities 5
    WebInspect 5

    Popular Tags

    • Application security
    • Black Hat
    • Fortify
    • fortify research
    • FREAK
    • Java
    • OGNL
    • owasp
    • research
    • secure coding
    • security
    • security content
    • Security Research
    • Software
    • software security
    • SSR
    • static analysis
    • static analyzer
    • Struts
    • Struts2
    • update
    • Vulnerabilities
    • vulnerability analysis
    • webinspect
    • XSS
    Options
    • Subscribe by email
    • Posts RSS
    • More
    • Cancel
    • Tags
    • Subscribe by email
    • More
    • Cancel

      SAPUI5 Common Pitfalls

      Common security vulnerabilities for SAPUI5 and OpenUI5 developers to look out for
      Peter_Blay
      by Peter_Blay in CyberRes
      0 0
      2021-04-26
      0 1

      Docker Security: Avoiding the ROOT of all Evil

      Intro First thing that comes to mind when you talk about containers is Docker. Docker has improved CI/CD agility and helped development teams deploy code to production faster. With this increased usage of docker, the security risks have increased too...
      Siddharth Kotian
      by Siddharth Kotian in CyberRes
      2021-01-18
      0 0

      OSINT News - January 18, by Bart Otten

      Sophisticated hacking campaign uses Windows and Android zero-days--Security Affairs

      The Google Project Zero team has recently launched an initiative aimed at devising new techniques to detect 0-day exploits employed in attacks in the wild. While partnering with the Google Threat Analysis Group (TAG), the experts discovered a watering hole […]

      securityaffairs.co

      COEST
      by COEST in CyberRes
      2021-01-11
      0 0

      OSINT News - January 11, by Bart Otten

      Post-Riot, the Capitol Hill IT Staff Faces a Security Mess

      In the aftermath of destructive riots that trashed the United States Capitol on Wednesday, the nation is grappling with questions about the stability and trajectory of US democracy. But inside the ...

      www.wired.com

      COEST
      by COEST in CyberRes
      2021-01-04
      1 0

      OSINT News - January 4th, by Bart Otten

      Sunburst: connecting the dots in the DNS requests 

      On December 13, 2020 FireEye published important details of a newly discovered supply chain attack. An unknown attacker, referred to as UNC2452 or DarkHalo planted a backdoor in the SolarWinds Orion IT software. This backdoor, which comes in the form of a .NET module, has some really interesting and rather unique features.

      securelist.com

      COEST
      by COEST in CyberRes
      2020-12-14
      0 0

      OSINT News - December 14, by Bart Otten

      Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers: A persistent malware campaign has been actively distributing Adrozek, an evolved browser modifier malware at scale since at least May 2020. At its peak in August, the threat was observed on over 30,000 devices every day. The malware is designed to inject ads into search engine results pages and affects multiple browsers…

      Bart Otten
      by Bart Otten in CyberRes
      2020-12-07
      0 0

      OSINT News - December 7, by Bart Otten

      Hundreds of millions of Android users exposed to hack due to CVE-2020-8913--Security Affairs

      Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android Play Core Library versions vulnerable to CVE-2020-8913 The CVE-2020-8913 flaw is a local, arbitrary code execution vulnerability that resides exists in the SplitCompat.install endpoint in Android’s Play Core Library. 

      securityaffairs…

      Bart Otten
      by Bart Otten in CyberRes
      2020-11-30
      0 0

      OSINT News - November 30, by Bart Otten

      A hacker is selling access to the email accounts of hundreds of C-level executives | ZDNet

      Access is sold for $100 to $1500 per account, depending on the company size and exec role.

      www.zdnet.com

      COEST
      by COEST in CyberRes
      2020-11-23
      0 0

      OSINT News - November 23, by Bart Otten

      A flaw in Facebook Messenger could have allowed spying on users--Security Affairs

      Facebook has addressed a major security issue in its Messenger for Android app that could have allowed threat actors to spy on users by placing and connecting Messenger audio calls without their interaction. 

      securityaffairs.co

      COEST
      by COEST in CyberRes
      2020-11-17
      0 0

      OSINT News - November 16, by Bart Otten

      Cyberattacks targeting health care must stop - Microsoft on the Issues

      In recent months, Microsoft has detected cyberattacks from nation-state actors targeting prominent companies directly involved in researching vaccines and treatments for Covid-19. We are calling on the world’s leaders to affirm that international law protects health care facilities and to take action to enforce the law.

      blogs.microsoft.com

      Bart Otten
      by Bart Otten in CyberRes
    >

    Resources

    Support
    Documentation
    Training
    CyberRes Academy
    Partner Portal
    Contact us
    Compliance
    Help
    Company
    Privacy Policy
    Terms of Use
    Accessibility
    Anti-Slavery Statement
    Support
    How To Buy
    Careers
    Investor Relations
    Follow Us
    © 2021 Micro Focus
    The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.