The threats against web applications, on-line businesses, and business critical applications is skyrocketing at an unforgiving rate of 200% year on year. The economic and geo-political situation prevailing in the world has further accentuated the threat vectors and space. Protecting business critical assets becomes paramount to survive in the...
Having reviewed 186 applications from 36 countries, the Kaspersky Open Innovation Program “Cyber Security for Small & Medium Businesses” has selected its top 12 finalists. The largest number of applications came from the US, UK, Israel, Russia, Germany, and France, with every...
Legends are visionaries; they dream and change the world by persistently working and pushing their limits. In the same way genius, needs no introduction. Despite their uneventful histories, they tend to be victorious. Discipline, self-belief, and strong determination are some...
This Cybersecurity Advisory (CSA) outlines the most common vulnerabilities and exposures (CVEs) used by state-sponsored cyber actors from the People’s Republic of China (PRC) since 2020, as assessed by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA),...
Introduction Security researchers recently disclosed the vulnerability CVE-2021-44228 in Apache’s log4j, which is a common Java-based library used for logging purposes. Components such as Struts2, Kafka etc. make use of log4j library. JNDI The Java Naming and Directory InterfaceTM (JNDI) is an application...
There’s an old age saying that prevention is better than cure. The biggest hindrance when it comes to cybersecurity is that there are so many trajectories that cybercriminals can possibly exploit, it’s often difficult for cybersecurity experts to conclude where best to...
Application security specialists are steering on a security landscape that has become increasingly complicated in recent years with the majority of people adopting the cloud and the growing use of Application Programming Interfaces. In a new survey conducted by Forrester Research...
The increase in cloud adoption is driving the need for nimble-footed application security. According to various reports, 80% of web applications now run in cloud environments, while 70% of organizations have stimulated their plans to migrate to the cloud in...
OWASP Top 10 threats list acts as a standard framework document that represents a broad consensus about the most critical security risks to web applications. Lately, The OWASP group, in an announcement made on 8th September 2021, has released its...