Legends are visionaries; they dream and change the world by persistently working and pushing their limits. In the same way genius, needs no introduction. Despite their uneventful histories, they tend to be victorious. Discipline, self-belief, and strong determination are some...
This Cybersecurity Advisory (CSA) outlines the most common vulnerabilities and exposures (CVEs) used by state-sponsored cyber actors from the People’s Republic of China (PRC) since 2020, as assessed by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA),...
Introduction Security researchers recently disclosed the vulnerability CVE-2021-44228 in Apache’s log4j, which is a common Java-based library used for logging purposes. Components such as Struts2, Kafka etc. make use of log4j library. JNDI The Java Naming and Directory InterfaceTM (JNDI) is an application...
There’s an old age saying that prevention is better than cure. The biggest hindrance when it comes to cybersecurity is that there are so many trajectories that cybercriminals can possibly exploit, it’s often difficult for cybersecurity experts to conclude where best to...
Application security specialists are steering on a security landscape that has become increasingly complicated in recent years with the majority of people adopting the cloud and the growing use of Application Programming Interfaces. In a new survey conducted by Forrester Research...
The increase in cloud adoption is driving the need for nimble-footed application security. According to various reports, 80% of web applications now run in cloud environments, while 70% of organizations have stimulated their plans to migrate to the cloud in...
OWASP Top 10 threats list acts as a standard framework document that represents a broad consensus about the most critical security risks to web applications. Lately, The OWASP group, in an announcement made on 8th September 2021, has released its...
Various major web services suffered due to an outage caused by cloud services provider Akamai Technologies DNS service. Content Delivery Platform, Akamai Technologies gave an alert on an “Edge DNS” service incident, noting a “partial outage” on its website and said it...
The classical theory of the security boundary is growing increasingly troublesome at the heels of highly publicized attacks. The boundaries are becoming nonexistent, as cloud-based architectures push back legacy systems. Adding on, the cyber kill chain is likewise altering into...