API4:2023 Unrestricted Resource Consumption
Welcome to the 5th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners.…
Welcome to the 5th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners.…
Serde, a popular Rust (de)serialization project, has decided to ship its serde_derive macro as a precompiled binary. The move has generated a fair amount of push back among…
At the Defcon security conference in Las Vegas last weekend, thousands of hackers competed in a red-team challenge to find flaws in generative AI chat…
Aug 19, 2023THNMalvertising / Website Security Cybersecurity researchers have detailed an updated version of an advanced fingerprinting and redirection toolkit called WoofLocker that’s engineered to…
Aug 19, 2023THNNetwork Security / Vulnerability Networking hardware company Juniper Networks has released an “out-of-cycle” security update to address multiple flaws in the J-Web component…
Aug 19, 2023THNMobile Security / Malware Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis. That’s…
In the tender tapestry of innocence, children stand as fragile blossoms, each petal holding dreams, vulnerabilities, and hopes yet to unfold. Yet, this very innocence…
This year’s Hack-A-Sat competition challenged teams to hack into an actual satellite in orbit. The US Air Force Moonlighter, which was launched especially for the…
Threat actors are actively modifying their TTPs to counter the advanced security mechanisms and tools to accomplish their illicit goals for several malicious purposes. Hiding…
Microsoft Exchange Server administrators may have to install a re-released security patch Microsoft has re-released the August 2023 Security Updates (SUs) for Exchange Server. The…
Citrix ShareFile can be exploited remotely by unauthenticated attackers. The Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability to its catalog of know…
A flaw impacting the file archiver utility for Windows WinRAR can allow the execution of commands on a computer by opening an archive. WinRAR is…