OWASP TOP 10: Missing Function Level Access Control
Missing Function Level Access Control is one of the vulnerabilities on OWASP’s Top 10 list and occurs when authentication checks in request handlers are insufficient. A…
Missing Function Level Access Control is one of the vulnerabilities on OWASP’s Top 10 list and occurs when authentication checks in request handlers are insufficient. A…
A steady increase in cyberattacks and evolving threat landscape are resulting in more organizations turning their attention to building long-term cyber resilience; however, many of…
The Identity Theft Resource Center (ITRC) has documented incidents of identity theft reported during 2022 and the first quarter of 2023, highlighting the use of…
Earlier this month, we introduced the all-new Program Directory with a fresh set of metrics and better filtering. Now, we’re taking it a step further…
University of Sydney’s Emiliano Fisanotti. The University of Sydney is set to renew its use of Azul’s Java platform after switching from an Oracle Java…
Cross-site Request Forgery (CSRF) is one of the vulnerabilities on OWASP’s Top 10 list. Its an attack used to make requests on behalf on the user.…
US pharmacy giant PharMerica has reported a cybersecurity incident that affects over 5.8 million people. The data theft has been claimed by ransomware group Money…
Hacktivity is a treasure trove of vulnerability data and tactics. You’ve got newly published reports from across the web, staple programs that believe in the…
We take a look at yet another ransomware group making use of leaked Babuk code. The bones of long gone ransomware group Babuk continue to…
Coming into effect in May 2018, the General Data Protection Regulation will give EU data protection legislation a much-needed update and simplify data protection routines…
By Aaron Sandeen, CEO and co-founder at In 2023, you can divide organizations into two categories: those who have been hit by a ransomware attack…
Earlier this year we introduced Hacker Email Aliases which enables you to secure set up accounts for hackers inside your program, but to make it…