Authentication Bypass

github.com/KubeOperator/KubeOperator is vulnerable to Authentication Bypass. The vulnerability exists because the `V1` function of `v1api.go` does not properly handle the online application routing pe ...

Continue Reading
Unlocking security updates for transitive dependencies with npm

Dependabot helps developers secure their software with automated [security updates](): when a security advisory is published that affects a project dependency, Dependabot will try to submit a pull req ...

Continue Reading
Vulnerability Spotlight: XSS vulnerability in Ghost CMS

![Vulnerability Spotlight: XSS vulnerability in Ghost CMS](https://blog.talosintelligence.com/content/images/2023/01/vuln-spotlight-2.jpg) _Dave McDaniel of Cisco Talos discovered this vulnerability._ ...

Continue Reading
Remediation made simple: Introducing new validity checks for GitHub tokens

If you’re on an application security team, you might use secret scanning to reduce the risk of leaked credentials, like passwords and API keys. When an exposed credential is found, your first ste ...

Continue Reading
APT15 enhanced its arsenal with an updated variant of the Turian backdoor

Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary APT15 has modified its toolkit to include new variants of the Turian backdoor, as well as new command and ...

Continue Reading
Wallarm Releases New End-to-End Solution to Reduce Risk and Time-to-Remediate Leaked API Keys and Secrets

_Advancement to API Security Technology Will Combat Recent Surge in Hacks Leveraging Leaked API; Early Release Now Available_ **San Francisco, CA –([BUSINESS WIRE]())**–** January 19, 2023** ...

Continue Reading
Introducing Proactive API Leak Management

_Read the [press release]() announcing the early release of Wallarm API Leak Management_ The recent surge in hacks involving leaked API Keys and other API secrets such as credentials, passwords, certi ...

Continue Reading
New Microsoft Azure Vulnerability Uncovered — Experts Warn of RCE Attacks

[![Microsoft Azure Vulnerability](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]() A new critical remote code execution (RCE) flaw ...

Continue Reading

Back to Main

Subscribe for the latest news: