A Practical Approach for Shifting Left
A practical approach to understanding shift left security and how shifting security left can help teams achieve DevSecOps success. As a critical part of DevSecOps,...
USN-5435-1: Thunderbird vulnerabilities
Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could...
USN-5434-1: Firefox vulnerabilities
It was discovered that the methods of an Array object could be corrupted as a result of prototype pollution by sending a message to the...
USN-5433-1: Vim vulnerabilities
It was discovered that Vim incorrectly handled parsing of filenames in its search functionality. If a user were tricked into opening a specially crafted file,...
Forging Australian Driver’s Licenses
The New South Wales digital driver’s license has multiple implementation flaws that allow for easy forgeries. This file is encrypted using AES-256-CBC encryption combined with...
Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago
Four years’ worth of records were accessed during the data breach Read More
USN-5432-1: libpng vulnerabilities
It was discovered that libpng incorrectly handled memory when parsing certain PNG files. If a user or automated system were tricked into opening a specially...
How to stay ahead of the Cybersecurity labor crisis and keep growing your business
This blog was written by an independent guest blogger. Cybersecurity is a complex task that is never complete. It’s an ongoing proactive practice of securing,...
IDaaS explained: How it compares to IAM
It is often said that identity is the new perimeter in the world of cloud-native ecosystems and zero trust. Identity is inarguably at the center...
Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet
After declaring cyber-war, Anonymous announced that the official Killnet site was offline Read More