Software supply chain attacks grew by more than 300% in 2021 compared to 2020, according to a study by Argon Security. According to the study, researchers discovered attackers...
Tighter controls have been introduced to resolve a weakness in GitHub Actions that made it possible to circumvent code review safeguards. Omer Gil and colleagues from...
Vulnerabilities in CMS platform Umbraco could allow an attacker to takeover a user’s account, researchers warn. Umbraco is a free and popular open source content management system (CMS)...
There is a “great cyber security awakening” happening across companies. Right now, we need a fundamental new approach to development, so we are not constantly firefighting. Almost two...
A server-side request forgery (SSRF) vulnerability in versions of VMWare authentication software could allow an attacker to obtain administrative JSON Web Tokens (JWT), researchers warn. The...
Bugcrowd released its 2022 Priority One report to spotlight the key cybersecurity trends of the past year, including the rise in the adoption of crowdsourced security due...
A tool designed to mimic OWASP API Top 10 vulnerabilities and to allow their behavior to be observed has been released to the open source community. vAPI, also...
A critical ‘zero-day’ vulnerability in network video recording equipment made by NUUO has been made public, as a researcher claims unpatched issues could lead to remote code...
The Apache Software Foundation (ASF) has warned that its efforts to respond rapidly to security vulnerabilities are being undermined by organizations running end-of-life versions of Apache...
While rapid technology advances have improved manufacturing operations in recent years, combining new and legacy operational technology (OT) has created security gaps that many manufacturers are just beginning...
Recent Comments