CVE-2020-28443
This affects all versions of package sonar-wrapper. The injection point is located in lib/sonarRunner.js. Read More
CVE-2020-28441
This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will...
CVE-2020-28438
This affects all versions of package deferred-exec. The injection point is located in line 42 in lib/deferred-exec.js Read More
CVE-2020-28436
This affects all versions of package google-cloudstorage-commands. Read More
CVE-2020-28435
This affects all versions of package ffmpeg-sdk. The injection point is located in line 9 in index.js. Read More
CVE-2020-28422
All versions of package git-archive are vulnerable to Command Injection via the exports function. Read More
What Are Ransomware Attacks? An In-Depth Guide
We all love to spend time surfing the web — whether we’re shopping, paying bills, or reacting to funny memes. The internet has also allowed...
The future of email threat detection
This blog was written by an independent guest blogger. As businesses continue to adopt cloud integration and remote work increases, security teams are facing more...
UK Seizes Nearly $27m in Crypto-Assets
Investigators trumpet money laundering crackdown Read More
9 tips to prevent phishing
Phishing, in which an attacker sends a deceptive email tricks the recipient into giving up information or downloading a file, is a decades-old practice that...