Apache Traffic Control Vulnerability Let Attackers Inject Malicious SQL Commands
25
Dec
2024

Apache Traffic Control Vulnerability Let Attackers Inject Malicious SQL Commands

A critical SQL injection vulnerability, identified as CVE-2024-45387, has been discovered in Apache Traffic Control, a widely used open-source platform…

Naveen Goud
25
Dec
2024

Nokia launches new tech against Quantum Threats and Interpol welcomes Convention against Cyber Crime

Nokia and Turkcell Introduce Revolutionary Quantum-Safe IPsec Cryptography for Mobile Networks Nokia, in partnership with Turkey’s leading telecommunications provider, Turkcell,…

Naveen Goud
25
Dec
2024

Top Trends in SaaS Security Testing: Safeguarding the Cloud in 2024

As Software-as-a-Service (SaaS) solutions continue to dominate the enterprise landscape, securing these cloud-based applications has become more critical than ever….

Postman Data Leak – 30,000 Publicly Accessible Workspaces Could Lead Massive Hack
25
Dec
2024

Postman Data Leak – 30,000 Publicly Accessible Workspaces Could Lead Massive Hack

Researchers uncovered a widespread and alarming trend involving data leaks from Postman, a widely used cloud-based API development and testing…

Apple seeks to defend Google's billion-dollar payments in search case
25
Dec
2024

Apple seeks to defend Google’s billion-dollar payments in search case – Software

Apple has asked to participate in Google’s upcoming US antitrust trial over online search, saying it cannot rely on Google…

Marriott and Starwood ordered to implement wide-ranging security program
25
Dec
2024

Marriott and Starwood ordered to implement wide-ranging security program – Security

Marriott and Starwood Hotels & Resorts must implement a “comprehensive information security program” to settle charges filed in the US…

Microsoft works to add non-OpenAI models into 365 Copilot products
25
Dec
2024

Microsoft works to add non-OpenAI models into 365 Copilot products – Software

Microsoft has been working on adding internal and third-party artificial intelligence models to power its flagship AI product Microsoft 365…

Print Friendly, PDF & Email
25
Dec
2024

Understanding Modern Security Postures –

Making sense of modern security postures can be challenging. In the past few years, the complexity of most IT environments…

Print Friendly, PDF & Email
24
Dec
2024

It Takes a Village – and a Lot of Time – to Manage Data Security and Compliance –

For security teams, sensitive content is generally at the centre of what they need to protect in their corporate IT…

New botnet exploits vulnerabilities in NVRs, TP-Link routers
24
Dec
2024

New botnet exploits vulnerabilities in NVRs, TP-Link routers

A new Mirai-based botnetis actively exploiting a remote code execution vulnerability that has not received a tracker number and appears…

Print Friendly, PDF & Email
24
Dec
2024

ETSI Security Conference 2024 – Post-Quantum Cryptography w/ Daniele Lacamera –

Daniele Lacamera is a software technologist and researcher. He is an expert in operating systems and TCP/IP, with more than…

Print Friendly, PDF & Email
24
Dec
2024

The Importance of Cybersecurity Hygiene –

Good cyber hygiene refers to the proactive steps and best practices users and organizations can take to keep their online…