Cyber Security
Despite growing awareness of secure coding practices in software companies, developers are struggling to discover and report security issues during code reviews, according to...
Hi, what are you looking for?
Despite growing awareness of secure coding practices in software companies, developers are struggling to discover and report security issues during code reviews, according to...
A security vulnerability in file transfer software CompleteFTP allowed unauthenticated attackers to delete arbitrary files on affected installations. Developed by EnterpriseDT of Australia, CompleteFTP is a...
Supply chain attacks on the rise, costing businesses more year on year as organizations failing to implement zero trust strategies. This is according to...
A catastrophic vulnerability in the implementation of certain encryption operations in Java JDK makes it easy for attackers to forge counterfeit credentials. The cryptographic weakness –...
Developers have patched a popular Ruby library for parsing and converting AsciiDoc files to safeguard servers against a newly discovered command injection vulnerability. Command...
A bug in one of PHP’s functions made it possible to bypass security measures meant to protect web applications against malicious user input, a...
The Rust security team has patched a bug in the regex crate that left applications open to Denial of Service (DoS) attacks. If a regular expression...
Microsoft has added new security features to its Edge browser, building on the ‘Super Duper Secure Mode’ that was unveiled late last year. A...
The standards agency said an attestation from the vendor themselves would be sufficient when screening for cybersecurity, unless an agency’s risk calculus suggests otherwise....
Concern is growing within the infosec community that a breach at DevOps platform vendor Travis CI might run deeper than the firm has so far been...