Fedora 39 : python-oauthlib (2023-da094276a2)

The remote Fedora 39 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2023-da094276a2 advisory. OAuthLib is an implementation of the OAuth request-signing ...

Continue Reading
Threat Roundup for November 3 to November 10

![Threat Roundup for November 3 to November 10](https://blog.talosintelligence.com/content/images/2023/11/threat-roundup-1.jpg) Today, Talos is publishing a glimpse into the most prevalent threats we' ...

Continue Reading
Leaving Authentication Credentials in Public Code

Interesting article about a surprisingly common vulnerability: programmers leaving authentication credentials and other secrets in publicly accessible software code: Researchers from security firm Gi ...

Continue Reading
27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts

An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for nearly six months with an aim to deliver malware capable of gaining persistenc ...

Continue Reading
API Leaks

## Grasping the Fundamentals of API Breaches API, short for [Application Programming Interface]( "Application Programming Interface" ), consists of a stipulated set of guidelines and procedures enabli ...

Continue Reading
Moderate: grafana security and enhancement update

Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): grafana: account takeover possible when using Azure AD OAuth ( ...

Continue Reading
Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access

Cybersecurity researchers have detailed a "severe design flaw" in Google Workspace's domain-wide delegation (DWD) feature that could be exploited by threat actors to facilitate ...

Continue Reading
Possible user mocking that bypasses basic authentication

Impact next-auth applications prior to version 4.24.5 that rely on the default Middleware authorization are affected. A bad actor could create an empty/mock user, by getting hold of a NextAuth.js-issu ...

Continue Reading

Back to Main

Subscribe for the latest news: