Skip to the content
February 1, 2023
Cyber Security NewsCyber Security News

Cyber Security News

News, Advisories and much more
  • Home
  • Academy
  • Advisories
  • News
1

Visualize Change with an Out-of-the-Box Configuration Report

January 31, 2023
2

Planet Ice hacked! 240,000 skating fans’ details stolen

January 31, 2023
3

GitHub Confirms Signing Certificates Stolen in Cyber-Attack, Revokes Them

January 31, 2023
4

DocuSign Brand Impersonation Attack Bypasses Security Measures, Targets Over 10,000

January 31, 2023
5

Financial Services Targeted in 28% of UK Cyber-Attacks Last Year

January 31, 2023
6

IoT, connected devices biggest contributors to expanding application attack surface

January 31, 2023
7

Guardz debuts with cybersecurity-as-a-service for small businesses

January 31, 2023
8

Privacera connects to Dremio’s data lakehouse to aid data governance

January 31, 2023
9

Trulioo launches end-to-end identity platform

January 31, 2023
Cyber Security News
Author:
Author: rocco
TV Virus – 1988 TV News Report
News

TV Virus – 1988 TV News Report

Sometimes I like to show some TV excerpt during the Cyber Security Awareness training sessions. It helps to boost the attention and to show how...

rocco
August 24, 2022October 6, 2022
Read More
CWE
CWE Education

CWE

CWE (Common Weakness Enumeration) is a list of common types of hardware and software defects that have security implications. The CWE list can be used...

rocco
May 27, 2022May 27, 2022
Read More
CWE

CWE-669 – Incorrect Resource Transfer Between Spheres

Description The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides...

rocco
May 26, 2022
Read More
CWE

CWE-67 – Improper Handling of Windows Device Names

Description The software constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a Windows device name such as...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-670 – Always-Incorrect Control Flow Implementation

Description The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-671 – Lack of Administrator Control over Security

Description The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect the environment in which the...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-672 – Operation on a Resource after Expiration or Release

Description The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. Modes of Introduction: - Architecture...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-673 – External Influence of Sphere Definition

Description The product does not prevent the definition of control spheres from external actors. Typically, a product defines its control sphere within the code itself,...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-674 – Uncontrolled Recursion

Description The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack....

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-675 – Multiple Operations on Resource in Single-Operation Context

Description The product performs the same operation on a resource two or more times, when the operation should only be applied once. Modes of Introduction:...

rocco
May 26, 2022May 26, 2022
Read More

Posts navigation

1 2 … 120 Next
  • Home
  • Academy
  • Advisories
  • News
To the Top ↑ Up ↑
Copyright © 2023 Cyber Security News. All rights reserved.
Theme: BoundlessNews By Themeinwp. Powered by WordPress.