Mitigate threats with the new threat matrix for Kubernetes

Today, we are glad to release the third version of the [threat matrix for Kubernetes](), an evolving knowledge base for security threats that target Kubernetes clusters. The matrix, first released by ...

Continue Reading
Mitigate threats with the new threat matrix for Kubernetes

Today, we are glad to release the third version of the [threat matrix for Kubernetes](), an evolving knowledge base for security threats that target Kubernetes clusters. The matrix, first released by ...

Continue Reading
Exploit for Incorrect Authorization in Hashicorp Consul

# **CVE-2021-41805** ### **Hashicorp Consul RCE via API** **Has...Read More ...

Continue Reading
2023 Predictions: API Security the new Battle Ground in Cybersecurity

The adoption of application programming interfaces, more commonly known as APIs, has increased dramatically in recent years. In many ways, APIs are now the backbone of the Internet. The reason? APIs a ...

Continue Reading
Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)

All versions of package gitpython is vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone ...

Continue Reading
This Week in Spring – December 6th, 2022

Hi, Spring fans! Welcome to another installment of _This Week in Spring_! How are you? You know what I've wanted to do? See my friends on the Spring team in person since the pandemic descended. And, I ...

Continue Reading
CVE-2022-46383

RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has exposed a privileged token via a public API endpoint (Incorrect Access Contro ...

Continue Reading
DEV-0139 launches targeted attacks against the cryptocurrency industry

Over the past several years, the cryptocurrency market has considerably expanded, gaining the interest of investors and threat actors. Cryptocurrency itself has been used by cybercriminals for their o ...

Continue Reading

Back to Main

Subscribe for the latest news: