Is Your Password Strong Enough? Brute Force Attack on the Rise!
Riddika Grover | | brute-force attack, cyber attacks, Cyber Security, Cyber-attack, Network Security, VAPT services, Web Application Security
In today’s technologically advanced world, our online accounts provide access to everything from personal information and funds to professional networks and interactions. Securing these accounts with strong passwords is critical. However, a ...
Wallarm’s Open Source API Firewall debuts at Blackhat Asia 2024 – Introduces Key New Features & Functionalities
Wallarm introduced its ongoing Open Source API Firewall project to the world at the recently concluded Blackhat Asia 2024 conference in Singapore. The open-source API Firewall by Wallarm is a free, lightweight ...
Companies Didn’t Prioritize Third-Party Sources of CVEs, Here’s What Happened
Last December, Veracode reported that more than a third of Java applications still use vulnerable versions of the Log4j Java logging library. This after many engineering teams dropped their regular work and spent ...
Why Understanding Your Open Source Licenses Matters
Fully understanding open-source licenses is crucial for your projects and organization. Let's look at where these licenses come from and how they can impact your applications ...
Roku experiences another data breach; Apple notifies users about mercenary spyware attacks
It’s rare to see a data breach study observers call a “mixed bag.” Normally, reports on data breaches are grim, touting how each year was a record high for the number of ...
How to Intercept Traffic from Proxy Unaware Application Using DNSChef
Siva Krishna Samireddy | | Application Security, DNS proxy, DNSChef, Penetration Testing, proxy unaware application, Write-up
In this blog, we will dive into an interesting method for intercepting traffic from applications implementing SSL Pinning and applications that do not respect system proxies. Xamarin, for instance, relies on the ...
USENIX Security ’23 – Account Verification on Social Media: User Perceptions and Paid Enrollment
Authors/Presenters: *Madelyne Xiao, Mona Wang, Anunay Kulshrestha, and Jonathan Mayer* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating ...
Critical RCE Vulnerability in 92,000 D-Link NAS Devices
Riddika Grover | | cyber attacks, Cyber Security, Cyber-attack, D-Link NAS Devices, Network Security, vulnerability, vulnerability scanning
Cyber attacks have become increasingly prevalent. This has caused significant adverse impacts on businesses of all sizes. According to the latest Ponemon Institute’s State of Cybersecurity Report, 66% of respondents reported experiencing ...
Apple Warns of ‘Mercenary Spyware Attacks’ on iPhone Users
Apple reportedly is alerting iPhone users in 92 countries that they may have been the targets of attacks using “mercenary spyware,” a term that the company is now using in such alerts ...
Security Boulevard