exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

About Packet Storm

Global Security Resource

In these times where a new major data breach occurs on a daily basis, it is important for the personal Internet user, corporations, and governments to stay aware of vulnerabilities that may affect their systems. Packet Storm provides around-the-clock information and tools in order to help mitigate both personal data and fiscal loss on a global scale. As new information surfaces, Packet Storm releases everything immediately through it's RSS feeds, Twitter, and Facebook. The site is referenced in over a hundred books and has a history of being spotlighted in the news.

The ancient Chinese millitary master Sun Tzu said: "I say: Know your enemy and know yourself; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant both of your enemy and of yourself, you are sure to be defeated in every battle." This maxim applies to the battlefield that is today's modern network, just as it has to all of the battlefields throughout humanity's long and strife ridden history.

In the modern world, security is everyone's job. If you are a vice president of engineering or an administrator in the trenches, responsibility lies with both parties for the safety of the organization. If you are deploying third party software in a PCI controlled environment, searching exploits and advisories may alert you to a bad track record for vulnerabilities that may change your decision. If you are outsourcing to a company that has had multiple data breaches in the past 5 years, searching the historical news feeds will shed light on their issues. If you are designing a web application and need to know common attack vectors and mitigation techniques, the whitepapers section provides guidance. If you are performing a penetration test for a client, the tools and exploits sections offer the latest available.

Our Demographics

Packet Storm has been a cornerstone on the Internet since 1998 and is visited monthly by over 190 countries. The site is meant to provide a unique service to everyone on the Internet - shedding full light on real security issues that may affect them. It is home to system administrators who need to keep their network up to date, security researchers who discover and report new findings, governments and corporations that need to understand current events, security vendors that want to develop new signatures for their software, and many others. Get involved and help secure the world.

Respecting the rights of legitimate researchers and national laws is paramount to providing a quality service, please review our copyright and privacy policies for more information.

Top Authors In Last 30 Days

Recent News

News RSS Feed
MarineMax Notifying 123,000 Of Data Breach
Posted Jul 18, 2024

tags | headline, hacker, privacy, malware, data loss, cryptography
Pentagon Leaker Jack Teixeira To Face Military Court-Martial
Posted Jul 18, 2024

tags | headline, government, usa, data loss, military
Iran Phishes Israeli Orgs With Custom BugSleep Backdoor
Posted Jul 17, 2024

tags | headline, hacker, malware, cyberwar, israel, phish, iran, backdoor
Ransomware Continues To Pile On Costs For Critical Infrastructure Victims
Posted Jul 17, 2024

tags | headline, hacker, malware, cybercrime, cryptography
Atlassian Patches High Severity Vulns In Bamboo, Confluence, Jira
Posted Jul 17, 2024

tags | headline, flaw, patch
Rite Aid Says Hack Impacts 2.2 Million People
Posted Jul 17, 2024

tags | headline, hacker, privacy, malware, cybercrime, data loss, cryptography
APT Exploits Windows Zero-Day To Execute Code Via Disabled Internet Explorer
Posted Jul 16, 2024

tags | headline, hacker, malware, microsoft, flaw, zero day
Organizations Warned Of Exploited GeoServer Vulnerability
Posted Jul 16, 2024

tags | headline, government, flaw
Case Of Man Who Falsely Claimed To Be Bitcoin Inventor Referred To CPS
Posted Jul 16, 2024

tags | headline, australia, fraud, cryptography
New Phishing Tactic Hijacks Email Protections To Mask Links
Posted Jul 16, 2024

tags | headline, email, fraud, flaw, phish
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close