Developers have resolved a series of vulnerabilities in storage technologies from Kaseya, including two critical flaws that each posed a remote code execution risk. Two unauthenticated SQL injection...
A vulnerability in Jamf Pro, a popular mobile device management (MDM) platform for Apple devices, allowed attackers to stage server-side request forgery (SSRF) attacks on the application’s servers,...
Enduring Security Framework (ESF) experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) published their third installment of guidance to protect the confidentiality,...
Different cloud environments have different security needs. Here’s how to create a cloud-security scaffolding to strengthen protections while reducing manual support. On-prem data centers, public cloud...
Critical vulnerabilities in open source forum platform NodeBB could allow attackers to steal private information and access admin accounts, researchers have warned. NodeBB is a JavaScript-based...
Cryptocurrency trading platform BitMart has revealed that around $150 million worth of funds have been stolen by malicious hackers. Blockchain security firm Peckshield has estimated losses of around...
The Nobelium hacking group continues to breach government and enterprise networks worldwide by targeting their cloud and managed service providers and using a new custom “Ceeloader” malware....
The document is the third in a four-part series of guidance that categorizes security responsibilities according to their relevance for the cloud service providers, mobile operators...
UPDATED A tool has been launched with support from Google that scans Python environments for packages with known vulnerabilities. ‘Pip-audit’ leverages the PyPI JSON API to compare dependencies against...
The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed out to...
Recent Comments