KEMs and Post-Quantum age

They're here! [NIST selected a first batch]() of post-quantum cryptographic key exchange and signature algorithms. [The report]() is a nice read that explains a lot of the goals, candidates, selection ...

Continue Reading
Breach Exposes Users of Microleaves Proxy Service

**Microleaves**, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, recently fixed a vulnerability in their website that exposed ...

Continue Reading
Kubernetes: Configuration Defaults

Configure the Kubernetes apiserver directory for compliance tests.Read More ...

Continue Reading
APT trends report Q2 2022

![](https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2021/03/12083054/green_digits_abstract-990x400.jpg) For five years, the Global Research and Analysis Team (GReAT) at Kaspersky has ...

Continue Reading
API Vulnerabilities Jump Up 3.7x in Q2-2022

Since the beginning of 2022, the Wallarm security research team has been analyzing API vulnerabilities and exploits, and releasing quarterly reports. The [Q1 report]() got a lot of attention and posit ...

Continue Reading
Eyes of Network API Insufficient Credential Protection (CVE-2020-8657)

A vulnerability exists in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence ...

Continue Reading
Out-Of-Bound Read

libgsasl is vulnerable to server-side read-out-of-bounds. The vulnerability is with malicious authenticated GSS-API client which allows an attacker to cause out-of-bound reads.Read More ...

Continue Reading
Dataease before 1.11.2 allows arbitrary code execution via crafter plugin

An issue in the component /api/plugin/upload of Dataease v1.11.1 allows attackers to execute arbitrary code via a crafted plugin. Version 1.11.2 contains a patch for the problem.Read More ...

Continue Reading

Back to Main

Subscribe for the latest news: