Log4j – First Year Anniversary ! Lesson Learned -Importance of Software Supply Chain Risk 4 min read Log4j – First Year Anniversary ! Lesson Learned -Importance of Software Supply Chain Risk December 5, 2022 The first anniversary of Log4j is about to come later in this week, this...Read More
API Keys and User data leaked by faulty Apps 1 min read API Keys and User data leaked by faulty Apps November 22, 2022 Security researchers have uncovered more than 1,500 apps leaking the Algolia API key and...Read More
ConnectWise Patches a Critical RCE 1 min read ConnectWise Patches a Critical RCE November 1, 2022 ConnectWise has patched a critical RCE flaw impacting Recover and R1Soft Server Backup Manager....Read More
Xiaomi Mobile Payment Vulnerability 1 min read Xiaomi Mobile Payment Vulnerability August 14, 2022 Vulnerabilities in Xiaomi’s mobile payment could lead to an attacker stealing private keys used...Read More
Most Exploited Common Apps – VirusTotal 1 min read Most Exploited Common Apps – VirusTotal August 4, 2022 The latest findings from VirusTotal reveals that cybercriminals and threat actors are increasingly relying on...Read More
Atlassian Jira SSRF Vulnerability 1 min read Atlassian Jira SSRF Vulnerability July 9, 2022 Researchers have discovered a SSRF flaw in Atlassian’s Jira an issue tracking and project...Read More
IBM patches Vulnerabilities in Jackson-Data bind 2 min read IBM patches Vulnerabilities in Jackson-Data bind June 13, 2022 IBM has fixed 57 vulnerabilities in its Process Mining software, used by enterprises to...Read More
Software Composition Analysis (SCA)- A dive! 2 min read Software Composition Analysis (SCA)- A dive! May 30, 2022 Software development’s today landscape traveled to have a lot and took major changes, with...Read More