Germany is trailing behind other European nations in terms of cybersecurity preparedness, as revealed in a recent international comparison. This comes amidst a significant surge in phishing incidents, which have seen a…
Category: Video
Dymocks Bookstore Suffers Major Breach – VIDEO
Dymocks Booksellers, a prominent bookstore chain, has disclosed a data breach that could potentially affect hundreds of thousands of its customers. The Australian-based company, boasting over 60 physical stores and an online…
Michigan University Cybersecurity Shutdown – VIDEO
The University of Michigan faced a significant cybersecurity incident that led to a two-day internet shutdown, affecting its campus IT systems used for research, fundraising, and potentially delaying financial aid reimbursements. The…
Ransomware Gang Exploits Backup Software – VIDEO
A ransomware gang known as Cuba is exploiting a high-severity vulnerability in enterprise backup solutions to deploy malware and steal login credentials, according to a report from BlackBerry’s Threat Research and Intelligence…
INFRA Revolutionizes Phishing Approach Using Artificial Intelligence – VIDEO
In the modern age, phishing represents a growing threat to cybersecurity. However, INFRA, a company at the forefront of technological innovation focused on cybersecurity, is changing the rules of the game. INFRA’s…
Server-Side Request Forgery (SSRF) – VIDEO
SSRF vulnerabilities have gained attention in the cybersecurity community, leading to their inclusion in the Top 10 OWASP list. These flaws arise when web applications fail to validate user-supplied URLs while fetching…
Identification and Authentication Failures – VIDEO
Authentication-related vulnerabilities, previously known as Broken Authentication, have become a significant concern. This category now includes weaknesses in identification processes. Notable vulnerabilities in this realm include CWE-297, CWE-287, and CWE-384. Properly confirming…
Vulnerable and Outdated Components – VIDEO
Vulnerable Components pose a unique challenge in application security, as they lack mapped Common Vulnerability and Exposures (CVEs) and are often difficult to test. In this post, we will explore the impact…
Insecure Design – VIDEO
Insecure design and architectural flaws are a new category of risks for 2021, and it is crucial to move beyond “shift-left” in the coding space to pre-code activities critical for the principles…
Security Misconfiguration – VIDEO
Misconfigurations in application security can pose a significant risk to organizations, potentially leading to unauthorized access, data breaches, and exploitation. It is alarming to note that approximately 90% of applications undergo testing…