Introducing Ghostbuster – AWS security tool protects against dangling elastic IP takeovers Post Views: 344 Reading Time: 1 Minute Ghostbuster from AWS, an open source security tool has been launched with the promise of a “fool-proof way” to detect dangling elastic IP...
Critical vulnerabilities in Zabbix Web Frontend allow authentication bypass, code execution on servers Post Views: 887 Reading Time: 1 Minute Two vulnerabilities in open source monitoring platform Zabbix could allow an attacker to bypass authentication and execute...
GitHub code scanning now finds more security vulnerabilities Post Views: 720 Reading Time: 1 Minute Code hosting platform GitHub today launched new machine learning-based code scanning analysis features that will automatically discover more common security...
Massive LinkedIn Phishing, Bot Attacks Feed on the Job-Hungry Post Views: 624 Reading Time: 2 Minutes The phishing attacks are spoofing LinkedIn to target ‘Great Resignation’ job hunters, who are also being preyed on by huge data-scraping bot attacks. ...
New tool can uncover redacted, pixelated text to reveal sensitive data Post Views: 1,570 Reading Time: 2 Minutes Researchers have demonstrated how a new tool can uncover redacted text from documents, potentially exposing sensitive information to nefarious actors....
Adobe: Zero-Day Magento 2 RCE Bug Under Active Attack Post Views: 553 Reading Time: 2 Minutes A zero-day remote code-execution (RCE) bug in the Magento 2 and Adobe Commerce platforms has been actively exploited in the wild. The security vulnerability bug...