FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

By: Newsroom β€” May 2nd 2024 at 14:22
Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability codenamed the Dirty Stream attack that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app's home directory. "The implications of this vulnerability pattern include arbitrary code execution and token theft,
☐ β˜† βœ‡ The Hacker News

Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

By: Newsroom β€” April 29th 2024 at 17:07
Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated to address issues with access to sensitive data such as location or SMS messages over the past year. The tech giant also said it blocked 333,000 bad accounts from the app storefront in 2023 for attempting to distribute malware or for repeated policy violations. "In 2023,
☐ β˜† βœ‡ The Hacker News

New 'Brokewell' Android Malware Spread Through Fake Browser Updates

By: Newsroom β€” April 26th 2024 at 10:42
Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical modern banking malware equipped with both data-stealing and remote-control capabilities built into the malware," Dutch security firm ThreatFabric said in an analysis published Thursday. The malware is said to be in active development,
☐ β˜† βœ‡ The Hacker News

Apache Cordova App Harness Targeted in Dependency Confusion Attack

By: Newsroom β€” April 23rd 2024 at 14:00
Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the same name to a public package repository. This&
☐ β˜† βœ‡ The Hacker News

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

By: Newsroom β€” April 1st 2024 at 06:04
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. "Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decrypted
☐ β˜† βœ‡ The Hacker News

Unmasking the Dark Side of Low-Code/No-Code Applications

By: The Hacker News β€” December 18th 2023 at 10:31
Low-code/no-code (LCNC) and robotic process automation (RPA) have gained immense popularity, but how secure are they? Is your security team paying enough attention in an era of rapid digital transformation, where business users are empowered to create applications swiftly using platforms like Microsoft PowerApps, UiPath, ServiceNow, Mendix, and OutSystems? The simple truth is often swept under
☐ β˜† βœ‡ The Hacker News

Bug or Feature? Hidden Web Application Vulnerabilities Uncovered

By: The Hacker News β€” December 15th 2023 at 11:08
Web Application Security consists of a myriad of security controls that ensure that a web application: Functions as expected. Cannot be exploited to operate out of bounds. Cannot initiate operations that it is not supposed to do. Web Applications have become ubiquitous after the expansion of Web 2.0, which Social Media Platforms, E-Commerce websites, and email clients saturating the internet
☐ β˜† βœ‡ The Hacker News

New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now

By: Newsroom β€” December 12th 2023 at 05:23
Apache has released a security advisory warning of a critical security flaw in the Struts 2 open-source web application framework that could result in remote code execution. Tracked as CVE-2023-50164, the vulnerability is rooted in a flawed "file upload logic" that could enable unauthorized path traversal and could be exploited under the circumstances to upload a malicious file
☐ β˜† βœ‡ The Hacker News

New Webinar: 5 Must-Know Trends Impacting AppSec

By: The Hacker News β€” October 30th 2023 at 12:09
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file transfers – it's almost impossible to imagine a world without them. However, they also introduce multiple attack vectors that exploit file uploads when working with public clouds, vulnerabilities in containers hosting web applications, and many other
☐ β˜† βœ‡ The Hacker News

Nation State Hackers Exploiting Zero-Day in Roundcube Webmail Software

By: Newsroom β€” October 25th 2023 at 13:20
The threat actor known asΒ Winter VivernΒ has been observed exploiting a zero-day flaw in Roundcube webmail software on October 11, 2023, to harvest email messages from victims' accounts. "Winter Vivern has stepped up its operations by using a zero-day vulnerability in Roundcube," ESET security researcher Matthieu FaouΒ saidΒ in a new report published today. Previously, it was using known
☐ β˜† βœ‡ The Hacker News

Zero-Day Attacks Exploited Critical Vulnerability in Citrix ADC and Gateway

By: THN β€” July 19th 2023 at 03:21
Citrix isΒ alertingΒ users of a critical security flaw in NetScaler Application Delivery Controller (ADC) and Gateway that it said is being actively exploited in the wild. Tracked asΒ CVE-2023-3519Β (CVSS score: 9.8), the issue relates to a case ofΒ code injectionΒ that could result in unauthenticated remote code execution. It impacts the following versions - NetScaler ADC and NetScaler Gateway 13.1
☐ β˜† βœ‡ The Hacker News

Over Half of Security Leaders Lack Confidence in Protecting App Secrets, Study Reveals

By: The Hacker News β€” June 13th 2023 at 13:53
It might come as a surprise, but secrets management has become the elephant in the AppSec room. While security vulnerabilities like Common Vulnerabilities and Exposures (CVEs) often make headlines in the cybersecurity world, secrets management remains an overlooked issue that can have immediate and impactful consequences for corporate safety.Β  A recent study by GitGuardian found that 75% of IT
☐ β˜† βœ‡ The Hacker News

What to Look for When Selecting a Static Application Security Testing (SAST) Solution

By: The Hacker News β€” May 24th 2023 at 10:51
If you're involved in securing the applications your organization develops, there is no question that Static Application Security Testing (SAST) solutions are an important part of a comprehensive application security strategy. SAST secures software, supports business more securely, cuts down on costs, reduces risk, and speeds time to development, delivery, and deployment of mission-critical
☐ β˜† βœ‡ The Hacker News

The Rising Threat of Secrets Sprawl and the Need for Action

By: The Hacker News β€” May 23rd 2023 at 11:16
The most precious asset in today's information age is the secret safeguarded under lock and key. Regrettably, maintaining secrets has become increasingly challenging, as highlighted by theΒ 2023 State of Secrets SprawlΒ report, the largest analysis of public GitHub activity.Β  The report shows aΒ 67% year-over-year increaseΒ in the number of secrets found, with 10 million hard-coded secrets detected
☐ β˜† βœ‡ The Hacker News

Product Security: Harnessing the Collective Experience and Collaborative Tools in DevSecOps

By: The Hacker News β€” May 9th 2023 at 12:54
In the fast-paced cybersecurity landscape, product security takes center stage. DevSecOps swoops in, seamlessly merging security practices into DevOps, empowering teams to tackle challenges. Let's dive into DevSecOps and explore how collaboration can give your team the edge to fight cyber villains. Application security and product security Regrettably, application security teams often intervene
☐ β˜† βœ‡ The Hacker News

Top 10 Cybersecurity Trends for 2023: From Zero Trust to Cyber Insurance

By: The Hacker News β€” April 10th 2023 at 11:38
As technology advances, cyberattacks are becoming more sophisticated. With the increasing use of technology in our daily lives, cybercrime is on the rise, as evidenced by the fact that cyberattacks causedΒ 92% of all data breachesΒ in the first quarter of 2022. Staying current with cybersecurity trends and laws is crucial to combat these threats, which can significantly impact business development
❌