ir FireHOL 3.1.1 By packetstormsecurity.com Published On :: Tue, 10 Jan 2017 23:02:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
ir FireHOL 3.1.2 By packetstormsecurity.com Published On :: Wed, 08 Feb 2017 23:02:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
ir FireHOL 3.1.3 By packetstormsecurity.com Published On :: Sat, 18 Feb 2017 16:01:21 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
ir FireHOL 3.1.4 By packetstormsecurity.com Published On :: Sun, 20 Aug 2017 18:22:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
ir FireHOL 3.1.5 By packetstormsecurity.com Published On :: Tue, 19 Sep 2017 02:44:24 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
ir FireHOL 3.1.6 By packetstormsecurity.com Published On :: Mon, 13 Aug 2018 19:38:27 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
ir Web-Based Firewall Logging Tool 1.1.1 By packetstormsecurity.com Published On :: Fri, 09 Nov 2018 17:59:24 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
ir HiddenWall Linux Firewall By packetstormsecurity.com Published On :: Tue, 11 Jun 2019 11:55:55 GMT This is a tool that generates a Linux kernel module for custom rules with Netfilter hooking to block ports, run in hidden mode, perform rootkit functions, etc. Full Article
ir Web-Based Firewall Logging Tool 1.1.2 By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 22:17:54 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
ir Iranians Resist Internet Censorship Amid Deadly Street Protests By packetstormsecurity.com Published On :: Tue, 02 Jan 2018 17:50:31 GMT Full Article headline government iran twitter censorship
ir Protests In Russia Target Internet Iron Curtain Legislation By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 14:35:35 GMT Full Article headline government russia cyberwar censorship
ir Vladimir Putin Signs Sweeping Internet Censorship Bills By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 14:17:50 GMT Full Article headline government russia censorship
ir Tor Project Loses A Third Of Staff In Coronavirus Cuts By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:31 GMT Full Article headline privacy virus cryptography
ir The CIA's Password For Their Hacking Tools Was 123ABCdef By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:20 GMT Full Article headline hacker government data loss password cia
ir Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
ir Social Media Giants Warn Of AI Moderation Errors As Coronavirus Empties Offices By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:06:52 GMT Full Article headline virus google facebook twitter
ir Personal Details For Entire Country Of Georgia Leaked Online By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:32:42 GMT Full Article headline government privacy data loss
ir Coronavirus: Health Leaders Credentials Dumped Online By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:05:03 GMT Full Article headline hacker government privacy virus data loss password
ir Valve Confirms CS:GO, Team Fortress 2 Source Code Leak By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:15:19 GMT Full Article headline hacker data loss
ir Australian Home Affairs Breach Leaks Details On 700,000 Migrants By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:08 GMT Full Article headline government privacy australia data loss
ir Turkey's Entire Citizenship Database May Have Been Leaked By packetstormsecurity.com Published On :: Mon, 04 Apr 2016 14:25:45 GMT Full Article headline government privacy cybercrime data loss fraud identity theft turkey
ir Common Desktop Environment 2.3.1 Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:40:08 GMT A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based. Full Article
ir Common Desktop Environment 1.6 Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:34:40 GMT A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected. Full Article
ir Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:37:07 GMT A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected. Full Article
ir Hacker's Hijack Security Firm Fox-IT's Domain By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:21:52 GMT Full Article headline hacker dns
ir Unprecedented DNS Hijacking Attacks Linked To Iran By packetstormsecurity.com Published On :: Sat, 12 Jan 2019 16:36:04 GMT Full Article headline dns iran
ir State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:29 GMT Full Article headline hacker government dns cyberwar
ir Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
ir Johnny You Are Fired By packetstormsecurity.com Published On :: Wed, 01 May 2019 14:44:44 GMT This archive contains proof of concepts and a whitepaper that describes multiple email client implementations where popular clients for email are vulnerable to signature spoofing attacks. Full Article
ir Windows Defender Antivirus 4.18.1908.7-0 File Extension Spoofing By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:42:41 GMT Windows Defender Antivirus version 4.18.1908.7-0 suffers from a file extension spoofing vulnerability. Full Article
ir First Clinical Trial Of Gene Editing To Help Target Cancer By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:23 GMT Full Article headline science
ir U.S. Records Its First Death From Coronavirus By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:35 GMT Full Article headline government virus china science
ir Track Coronavirus Updates In Real Time By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:25:04 GMT Full Article headline government virus science
ir Coronavirus Lockdowns: 24 Hours Of Confusion Around The World By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:49 GMT Full Article headline government virus science
ir Coronavirus Has Slashed Air Pollution. This Interactive Map Shows How. By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:07:37 GMT Full Article headline virus science
ir How Coronavirus Sentiment And Behavior Has Changed By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:43 GMT Full Article headline government science
ir State-Backed Hackers Are Trying To Steal Coronavirus Research By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:00 GMT Full Article headline hacker government virus science
ir British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data By packetstormsecurity.com Published On :: Tue, 13 Aug 2019 14:29:35 GMT Full Article headline privacy britain data loss terror
ir Labour Party Confirms Cyber Attack Was DDoS By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:15 GMT Full Article headline government britain denial of service
ir UK Coronavirus App Must Respect Privacy Rights By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:48 GMT Full Article headline privacy virus phone britain
ir Deutsche Telekom Hack Suspect Arrested At London Airport By packetstormsecurity.com Published On :: Fri, 24 Feb 2017 15:02:16 GMT Full Article headline hacker germany
ir Tele Columbus Confirms Hacker Attack On Customers By packetstormsecurity.com Published On :: Mon, 06 Nov 2017 14:23:02 GMT Full Article headline hacker privacy phone data loss germany
ir Pharma Firm Bayer Hit With WINNTI Malware By packetstormsecurity.com Published On :: Fri, 05 Apr 2019 15:14:53 GMT Full Article headline hacker malware china cyberwar germany
ir Breached Airbus Employee Data Gets Released On The Dark Web By packetstormsecurity.com Published On :: Fri, 01 Feb 2019 16:21:50 GMT Full Article headline hacker privacy data loss france
ir French Cybercops Dismantle Pirate Computer Network By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 15:11:00 GMT Full Article headline hacker government cybercrime botnet fraud france
ir Clam AntiVirus Toolkit 0.100.2 By packetstormsecurity.com Published On :: Fri, 05 Oct 2018 23:55:22 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article
ir Clam AntiVirus Toolkit 0.101.0 By packetstormsecurity.com Published On :: Tue, 04 Dec 2018 05:06:18 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article
ir Clam AntiVirus Toolkit 0.101.1 By packetstormsecurity.com Published On :: Mon, 07 Jan 2019 21:39:21 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article
ir Avast Anti-Virus Local Credential Disclosure By packetstormsecurity.com Published On :: Sun, 10 Feb 2019 13:22:22 GMT Avast Anti-Virus versions prior to 19.1.2360 suffer from a local credential disclosure vulnerability. Full Article
ir Clam AntiVirus Toolkit 0.101.2 By packetstormsecurity.com Published On :: Wed, 27 Mar 2019 18:00:52 GMT Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. Full Article