Cyber Security
INTERVIEW Securing web APIs requires a different approach to classic web application security, as standard tests routinely miss the most common vulnerabilities. This is the view...
Hi, what are you looking for?
INTERVIEW Securing web APIs requires a different approach to classic web application security, as standard tests routinely miss the most common vulnerabilities. This is the view...
To shore up its cyber defenses, State is identifying potential vulnerabilities across its many disparate systems and working to boost its use of multifactor...
HAProxy, the popular open source load balancer and reverse proxy, has patched a bug that could enable attackers to stage HTTP request smuggling attacks. By sending a maliciously...
A new Mirai botnet variant tracked as ‘V3G4’ targets 13 vulnerabilities in Linux-based servers and IoT devices to use in DDoS (distributed denial of...
Defense’s updated plan focuses on role-specific requirements and comes as the agency’s cyber workforce strategy is slated for imminent release. The Defense Department’s Chief...
An Office of the National Cyber Director official discussed the path of transitioning public and private networks to post-quantum cryptographic standards, and emphasizes data...
Want to get the latest web security news straight to your inbox? Now you can, with the upcoming launch of The Daily Swig’s first ever...
Belgium has become the first European country to adopt a national, comprehensive safe harbor framework for ethical hackers, according to the country’s cybersecurity agency....
Apache has resolved a vulnerability potentially exploitable to launch remote code execution (RCE) attacks using Kafka Connect. Announced on February 8, the critical vulnerability...
The top cybersecurity risks of 2023 include a shortage of trained cyber professionals, international strife and continued vulnerabilities in critical infrastructure services, according to...