Sensitive data exposure is a significant concern when it comes to web application security. It often occurs due to failures related to cryptography and can lead to the exposure of confidential information….
Category: English
Broken Access Control – VIDEO
Access control is a critical aspect of ensuring the security of web applications. Broken access control vulnerabilities can lead to unauthorized access, data disclosure, and other malicious activities. In the OWASP Top…
Microsoft Confirms PaperCut Servers Hacked by Ransomware
Microsoft has confirmed that the active exploitation of PaperCut servers is linked to attacks designed to deliver Cl0p and LockBit ransomware families. The threat intelligence team of the large technology company attributed…
Russian-speaking Cyber-Espionage Group “Nomadic Octopus”
Nomadic Octopus is a Russian-speaking cyber-espionage group that has been linked to a surveillance campaign targeting high-ranking government officials, telecom services, and public service infrastructures in Tajikistan. The intrusion set, known as…
RTM Locker: Ransomware-as-a-Service Targeting Linux Machines
RTM Locker is a strain of ransomware developed by malicious actors that is capable of targeting Linux machines, marking the group’s first attempt to exploit an open source operating system. It is…
Rising Tensions: US and Iran on the Brink of War
The United States and Iran are on the brink of a potential war, with the US having assassinated Iranian Major General Qasem Soleimani in a targeted drone strike in January 2020. This…
Shodan: Indexing and Exploiting IoT Devices
Shodan is a search engine for the Internet of Things that allows anyone to find, search and potentially exploit any internet-connected device in their vicinity. It indexes devices that are not websites,…
Securing Business Networks Through Software Composition Analysis
Software Composition Analysis (SCA) is an important layer of security for modern business networks, as software developers increasingly rely on open source and commercial components. Open source coding has become a dominant…
Rising Demand for MSSPs
Managed Security Service Providers (MSSPs) have been helping companies operate more securely for some time, but demand for their services has skyrocketed due to digital transformation and the COVID-19 pandemic. It is…
Russian Hackers Conduct Complex Cyberattacks
A group of Russian hackers is alleged to have conducted a series of complex cyberattacks against U.S. government entities, private organizations, and individuals. The Washington Post has identified Cozy Bear, a Russian…