Category: EN

API Security in 2024: Navigating New Threats and Trends

[By Tyler Shields, Vice President at Traceable AI] As we step into 2024, the landscape of API security is at a critical juncture. The previous year witnessed a significant escalation in API-related breaches, impacting diverse organizations and bringing to light…

Social Justice: a global perspective

Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals’ rights are recognized and protected.  I have the distinct honor of leading the Social…

ConnectWise fixed critical flaws in ScreenConnect remote access tool

ConnectWise addressed two critical vulnerabilities in its ScreenConnect remote desktop access product and urges customers to install the patches asap. ConnectWise warns of the following two critical vulnerabilities in its ScreenConnect remote desktop access product: Both vulnerabilities were reported on…

Menlo Security Adds SaaS Platform to Manage Secure Browsers

Menlo Security’s SaaS platform applies and manages cybersecurity policies to secure Google Chrome or Microsoft Edge browsers. The post Menlo Security Adds SaaS Platform to Manage Secure Browsers appeared first on Security Boulevard. This article has been indexed from Security…

Vulnerability Summary for the Week of February 12, 2024

  High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info wp_swings — coupon_referral_program   Deserialization of Untrusted Data vulnerability in WP Swings Coupon Referral Program. This issue affects Coupon Referral Program: from n/a through 1.7.2.…

Defending Access to the Decentralized Web

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Decentralized web technologies have the potential to make the internet more robust and efficient, supporting a new wave of innovation. However, the fundamental technologies and services that…

Wireless Visibility: The MUST for Zero Trust

[By Brett Walkenhorst, Ph.D., CTO, Bastille] Zero Trust has been an important paradigm for advancing network security for almost 15 years, incorporating tenets that move beyond perimeter-based control toward a multi-layered approach that seeks to minimize risk in the modern…

5 Ways to Counteract Increasing Cyber Insurance Rates

[By Brett Bzdafka, principal product manager at Blumira] Businesses today face an ever-increasing number of cyberattacks on average, often posing potential financial impacts in the 7-figure range. Despite this threat, only 55% of organizations have some form of cyber insurance,…

Joomla: Multiple XSS Vulnerabilities

Our Clean Code solution, SonarCloud, led us to a severe security issue in the popular Content Management System Joomla. The post Joomla: Multiple XSS Vulnerabilities appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…