Towerwall's InfoSec Blog

Content Type

See all

Bugs for cash: Bounty hunters in the new wild west of security

Open Web Application Security Project (OWASP) , software bugs , Pwn2Own , Bugcrowd , DROWN , OWASP , white market , cannabis , Enterprise

Michelle Drolet

How security researchers and programmers hunt software bugs for cash rewards The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly that unscrupulous bounty hunters can take advantage of if they successfully identify a vulnerability. The average cost of a data breach is $3.8false

Hundreds of cloud apps still vulnerable to DROWN

SSLv2 , CISO , DROWN vulnerability , FREAK , DROWN , HTTPS , cannabis , Enterprise

Michelle Drolet

Complacency in addressing known vulnerabilities puts users at risk If you have even a passing interest in security vulnerabilities, there’s no chance that you missed the news about the DROWN vulnerability. It’s one of the biggest vulnerabilities to hit since Heartbleed, potentially impacting a third of all HTTPS websites. By exploiting the obsolete SSLv2 protocol, this flaw makes it possible for an attacker to eavesdrop on a TLS session. Because we use SSL and TLS encryption to shop, sendfalse

DROWN attack sinks security for millions of websites

SSLv2 server , NetworkWorld , DROWN , TLS

Michelle Drolet

Security researchers reveal new technique to break TLS using SSLv2 server. The war to close down security vulnerabilities is never-ending, but the new “DROWN” vulnerability is one of the biggest to rear its ugly head in recent months. A group of security researchers from a number of different universities and research institutes just unveiled this vulnerability, which they say could affect 33% of all HTTPS servers. That potentially exposes around 11.5 million HTTPS servers worldwide plusfalse