-0.2 C
Munich
Friday, April 26, 2024

Application Security

HeadCrab Malware Threatens Redis Servers

A new type of malware, dubbed "HeadCrab", has been discovered by Nitzan Yaakov and Asaf Eitani, researchers at Aqua Security. It is designed to...

Critical Vulnerability Discovered in Jira Service Management Server and Data Center

A critical security vulnerability has been discovered in Jira Service Management Server and Data Center, which has been assigned the CVE identifier CVE-2023-22501 and...

Zero-Day Vulnerability Found in Fortra’s GoAnywhere MFT

A dangerous zero-day vulnerability has been discovered in Fortra's GoAnywhere Managed File Transfer (MFT) application and is currently being actively exploited. Security reporter Brian...

Apple Announces New Security Features

Apple has announced the introduction of three new advanced security features focused on protecting against threats to user data in the cloud. “At Apple, we...

Half of Twitter’s Workers Have Access to Its Code And User Confidential Data

Twitter's former head of security accused the social media company and its executives of “extensive legal violations.” Peiter Zatko, Twitter’s head of security who was...

Three New Web Application Security Risks Climb Up The OWASP Top 10

OWASP Top 10 is a standard awareness document which represent a consensus about the most critical security risks to web applications. For the year 2021,...

How to Secure Your Microservices

Compared to monolithic applications, which house all code in a single system, microservices are small, autonomous units that address individual functions and work with...

Google Cloud Gets Virtual Machine Threat Detection to Help Detect Crypto Mining

Google announced the public preview of a tool which helps identify threats within virtual machines running on its Google Cloud infrastructure. VMTD to Help Identify...

13 Known Exploited Vulnerabilities Added to CISA Catalog

CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed...

What are Dependency Confusion Attacks?

A dependency confusion attack (or supply chain attack) occurs when a software installer script is tricked into pulling malicious code file from a public...

Huge Increase of WordPress Vulnerabilities in 2021

Riskbased Security researchers revealed a huge increase of WordPress vulnerabilities in 2021 in their latest research. 10,359 vulnerabilities were reported to affect third-party WordPress...

Patch Microsoft Critical Flaw Now

Latest Microsoft security updates address a new critical flaw CVE-2022-21907 in the HTTP protocol stack which could potentially lead to remote code execution. Microsoft...

Latest