A group of software package maintainers have created a tool for defending applications that depend on open source JavaScript libraries. Called Socket, the tool uses a...
Doubts have arisen about the veracity of research that purportedly demonstrates a serious vulnerability involving VirusTotal, a Google-owned antivirus comparison and threat intel service. VirusTotal (VT) offers a service...
A SQL injection (SQLi) vulnerability in an open source platform developed by Greek universities to manage student data left academic grades at risk of manipulation. Miscreants leveraging the...
Web developers who rely on a workaround that relaxed the same origin policy to allow subdomains to exchange content will soon need to take a different...
The software Industry wants agencies to show their ‘use’ of the NIST Cybersecurity Framework, which it says should be mapped to the revised supply chain guidance....
But, in general, the industry wants NIST to avoid making any changes at all to the choose-your-own-adventure document that has guided risk management and U.S. cybersecurity...
The Homeland Security Department’s first bug bounty program reaped some benefits. On Monday, the Department of Homeland Security announced 450 researchers working in its first-ever “Hack...
Another CISA advisor has referred to Bob Lord as a “digital Marie Kondo,” tidying up the Democratic National Committee by throwing out old software and unused...
Intigriti has today announced a new program that will combine bug bounty hunting with penetration testing models to offer hackers payment by the hour for their...
IBM has updated data management platform Db2 in order to protect users from a pair of critical vulnerabilities in older versions of Expat, a third-party library....
Recent Comments