Since the advent of cloud computing, a persistent question remains: How do cloud service providers secure businesses with cloud-based infrastructure? The reality is that inadequate...
According to Apple, Gatekeeper is an essential defence mechanism embedded in macOS to prevent untrusted applications from running on the operating system. Recognizing its...
Introduction
Ensuring application security is fundamental to safeguarding sensitive information and maintaining user trust. Implementing robust security practices is crucial for protecting digital assets and...
The United States Cybersecurity and Infrastructure Security Agency (CISA) has officially added two critical vulnerabilities to its Known Exploited Vulnerabilities catalogue. These vulnerabilities have...
What is Application Security
Application security is a crucial aspect of software development that aims to protect the application code and the data it handles...
Businesses worldwide faced significant disruptions as a recent CrowdStrike update caused Windows workstations to crash, leading to the infamous “blue screen of death.” CrowdStrike...
A vulnerability tracked as CVE-2024-39929 with a CVSS score of 9.1, has been addressed. This flaw previously allowed threat actors to craft and deliver...
Researchers have discovered ViperSoftX, a sophisticated malware previously detected by Fortinet in 2020, lurking within torrents disguised as eBooks. ViperSoftX dynamically loads and runs...
Cybersecurity professionals have uncovered a sophisticated supply chain attack involving GitHub, npm, and jsDelivr code repositories. The attacker cleverly embedded malware within the rarely...
Apple recently yielded to government pressure and removed several virtual private network (VPN) apps from the Russian App Store. The action affected 25 mobile...
Cybersecurity researchers recently confirmed the existence of Zergeca, a powerful botnet written in Golang. Unlike typical DDoS botnets, Zergeca boasts an impressive array of...
An unsealed indictment charges four Vietnamese nationals with involvement in a series of cyber intrusions that collectively caused U.S. companies to suffer over $71...
Recent investigations by cybersecurity experts have unveiled the operations of 'Markopolo', a sophisticated cybercriminal mastermind orchestrating extensive cryptocurrency thefts. This threat actor has been...
According to cybersecurity researchers, the Indian government is currently under attack by a suspected Pakistan-based possible state-sponsored threat actor. The report suggests the threat...
A report from CISA confirmed adding an actively exploited security flaw tagged CVE-2017-3506with CVSS score of 7.4 affecting the Oracle WebLogic Server to the...
A statement by Okta confirms the possibility of cross-origin authentication. It warns customers that they might become victims of this Customer Identity Cloud (CIC)...
Cybersecurity researchers and dark web trackers have brought security agencies’ attention to the return of the famous cybercriminal called BreachForum. This is happening barely...
Cybersecurity researchers have uncovered the actions of Transparent Tribe, a Pakistani-linked threat actor, who used malware written in Python, Golang, and Rust to attack...
As part of plans to favour the release of more advanced alternative applications such as JavaScript and PowerShell, Microsoft on Wednesday announced the deprecation...