A centralized way to consume your information security news, with a focus on web application security. Save time and effort,…
A joint operation conducted by DHS, FCEB, and CISA Identified multiple attempts of a cyber attack on the U.S. Government…
Here’s a look at the most interesting products from the past week, featuring releases from Atakama, Elevate Security, Hornetsecurity, HYPR,…
Mar 17, 2023Ravie LakshmananMobile Security / Firmware Google is calling attention to a set of severe security flaws in Samsung’s…
Yet another organization has been compromised following Forta’s GoAnywhere hack. After Community Health Systems, Hatch Bank, Canada’s asset managing firm…
At Assetnote, we often audit enterprise software source code to discover pre-authentication vulnerabilities. Yellowfin BI had significance to us because…
Cloud environments provide many benefits, primarily involving their ease of scalability and resilience. Those qualities exist because of automation and…
The advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India, Lithuania, Slovakia,…
Miami-based healthcare administrator and managed care solutions provider Independent Living Systems (ILS) suffered a massive data breach last July, which…
Summary This blog post is a reminder that you should make sure that all your builds in the Java ecosystem…
Microsoft has released a script to make it easier to patch a BitLocker bypass security vulnerability in the Windows Recovery…
All these days, we have seen cyber criminals infiltrating networks and taking down computers. But after the spread of the…