Blog

Perl logo

30 Dec: Perl Function Integer / Heap Overflows

Perl is a high-level programming language with roots in C, sed, awk and shell scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl’s hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl’s most…

Sectigo logo

30 Dec: Comodo rebrands to Sectigo

Comodo CA, the world’s largest commercial Certificate Authority and a leader in web security solutions, announced today that the company is rebranding to Sectigo. This was a decision that has been in the works for a while now and stems from the acquisition of the Comodo Certificate Authority by…

woktron-blog-icon

28 Mar: Woktron invites visitors to explore new website

Woktron Web Hosting is inviting visitors to explore its new website and hosting products. The new website has been redesigned to provide a clean and uncluttered appearance with improved functionality and enhanced rich content focused on our Company’s mission to provide the world’s finest web hosting, dedicated hosting and…

blog_exim

25 Nov: Critical Exim Security Vulnerability

A remote code execution vulnerability has been reported in Exim, with immediate public disclosure (we were given no private notice). A tentative patch exists but has not yet been confirmed. Exim is a widely used mail transfer agent used on Unix-like operating systems.

blog_mongodb

08 Sep: MongoDB ransomware attacks

Ransom attacks on MongoDB databases reemerged last week when three new groups of hackers hijacked around 26,000 servers containing MongoDB databases and demanded victims to pay 0.2 BTC (currently around $650) to have the databases restored.

blog_gnupg

07 Jul: libgcrypt vulnerability patched

Researchers from universities in Adelaide, Eindhoven, Chicago, Maryland and Pennsylvania have published a paper describing how they used a local side-channel attack to break the Libgcrypt encryption library. The exploit could be used to recover a RSA-1024 key.