Thursday, September 19, 2024

Communications

How do cloud service providers secure businesses with cloud-based infrastructure?

Since the advent of cloud computing, a persistent question remains: How do cloud service providers secure businesses with cloud-based infrastructure? The reality is that inadequate...

Gatekeeper Controls Tightened to Block Unauthorized Software

According to Apple, Gatekeeper is an essential defence mechanism embedded in macOS to prevent untrusted applications from running on the operating system. Recognizing its...

APPLICATION SECURITY BEST PRACTICES

Introduction Ensuring application security is fundamental to safeguarding sensitive information and maintaining user trust. Implementing robust security practices is crucial for protecting digital assets and...

Twilio Authy and IE Flaws Now Added to Exploited Vulnerabilities List 

The United States Cybersecurity and Infrastructure Security Agency (CISA) has officially added two critical vulnerabilities to its Known Exploited Vulnerabilities catalogue. These vulnerabilities have...

Introduction To Application Security

What is Application Security Application security is a crucial aspect of software development that aims to protect the application code and the data it handles...

CrowdStrike Update Crashes Windows Systems Worldwide

Businesses worldwide faced significant disruptions as a recent CrowdStrike update caused Windows workstations to crash, leading to the infamous “blue screen of death.” CrowdStrike...

Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments

A vulnerability tracked as CVE-2024-39929 with a CVSS score of 9.1, has been addressed. This flaw previously allowed threat actors to craft and deliver...

Torrents Harbor ViperSoftX Malware 

Researchers have discovered ViperSoftX, a sophisticated malware previously detected by Fortinet in 2020, lurking within torrents disguised as eBooks. ViperSoftX dynamically loads and runs...

Supply Chain Attack Targets jQuery Packages.

Cybersecurity professionals have uncovered a sophisticated supply chain attack involving GitHub, npm, and jsDelivr code repositories. The attacker cleverly embedded malware within the rarely...

VPN Apps Removed from Russian App Store Sparks Controversies

Apple recently yielded to government pressure and removed several virtual private network (VPN) apps from the Russian App Store. The action affected 25 mobile...