Researcher Exploited Nexus Repository Directory Traversal Vulnerability
Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes. The widespread use of GitHub and the diverse range of codebases…
Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes. The widespread use of GitHub and the diverse range of codebases…
Trellix research exposes the dangers of fake antivirus websites disguised as legitimate security software but harbouring malware. Learn how to identify these scams and protect…
You’re probably familiar with the term “critical assets”. These are the technology assets within your company’s IT infrastructure that are essential to the functioning of…
The government is bringing in specialist investigators to examine whether a Post Office software application in use during the 1990s – before the controversial Horizon…
Security experts have disclosed advanced methods for bypassing Web Application Firewalls (WAFs) on a large scale, and they have also introduced a new Burp Suite…
Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting malware through harmful sites, and flooding DNS servers with fake requests…
Uncover IT security weaknesses and ensure compliance with infosec audits. Regular audits protect your data from breaches & meet regulations. Learn more about infosec audits…
The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months to infiltrate…
The Metropolitan Police has confirmed it is setting up a national investigation into the Post Office scandal, although it could take at least two years…
The impact of the Cencora data breach is far more widespread than earlier thought as more than a dozen pharmaceutical giants including Novartis and GlaxoSmithKline…
A recent data breach has reportedly compromised the personal information of Decathlon employees in Spain. The threat actor known as 888 has taken responsibility for…
A new privilege escalation vulnerability has been discovered in Zscaler Client Connector, combining three different vulnerabilities. The three vulnerabilities were associated with Reverting password check…