❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 17 May 2024Main stream
Before yesterdayMain stream

Vulnerabilities prioritization funnel: Focus on what matters

16 May 2024 at 09:51

We are excited to announce updates to our vulnerability prioritization funnel, which will help you focus on vulnerabilities that pose a real danger to your business.

The post Vulnerabilities prioritization funnel: Focus on what matters appeared first on Security Boulevard.

Protect your Hardware Security Module | Blog | Code Intelligence

14 May 2024 at 04:26

As vehicles become increasingly reliant on software, secure and functional Hardware Security Modules (HSMs) are paramount. Unknown vulnerabilities in your automotive software can pose a significant threat to your products and business by putting you at risk of coding errors or insecure configurations, which can be exploited by malicious actors or lead to consequential failures.

Therefore, continuously testing HMS modules is crucial to ensure that functional and security bugs are found long before they make it anywhere near a finished product. In the automotive industry, where undiscovered issues can put human lives at risk or lead to costly callbacks, thorough testing is paramount. Considering the pivotal role of HSMs as the root of trust in communication within a car, if an attacker can take over an HSM, the consequences are dire. Such a breach not only jeopardizes data integrity but also poses a significant threat to vehicle safety and passenger security. Hence, rigorous testing remains the primary defense against these potentially devastating breaches.

At Code Intelligence, we've repeatedly discovered various security issues in HSMs throughout the automotive industry that had slipped through multiple β€œtraditional”, ranging from remote code executions and buffer overflows to heap use after free and segmentation fault.

The post Protect your Hardware Security Module | Blog | Code Intelligence appeared first on Security Boulevard.

HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks

13 May 2024 at 03:00

Recently, HPE Aruba Networking, formerly known as Aruba Networks, has encountered significant security challenges. Vulnerabilities in their ArubaOS, the proprietary network operating system, have been identified, posing serious risks, including remote code execution (RCE). In this article, we delve into the details of these HPE Aruba vulnerabilities, their implications, and the recommended actions to mitigate […]

The post HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks appeared first on TuxCare.

The post HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks appeared first on Security Boulevard.

API Security and The Silent Menace of Unknown APIs

8 May 2024 at 18:59

The digital application landscape is evolving rapidly, with APIs as the backbone of modern software development. However, amidst all this innovation lies a silent menace:Β  the prevalence of unknown APIs. These APIs, often lurking beyond sanctioned channels, pose significant security risks to organizations. From shadow APIs born of good intentions to not fully deprecated endpoints […]

The post API Security and The Silent Menace of Unknown APIs appeared first on Blog.

The post API Security and The Silent Menace of Unknown APIs appeared first on Security Boulevard.

Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award

7 May 2024 at 21:13

We are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Excellence Award, under the category Best API Security Product. Our unwavering commitment to pioneering solutions that safeguard digital ecosystems, and fortify API security amidst the evolving cyber threat landscape, has garnered industry-wide recognition. This accolade reaffirms Wallarm's position at the forefront of [...]

The post Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award appeared first on Wallarm.

The post Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award appeared first on Security Boulevard.

2024 OWASP Mobile Top Ten Risks

7 May 2024 at 14:24

What is OWASP MASVS?

In case you didn't notice, the OWASP Mobile Top 10 List was just updated, for the first time since 2016! This is important for developers since this list represents the list of the most crucial mobile application security risks in 2024. This blog explains how this fits in with other OWASP security guidelines, summarizes each of the 10 risks and discusses some possible next steps for developers.Β 

The post 2024 OWASP Mobile Top Ten Risks appeared first on Security Boulevard.

Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites?

6 May 2024 at 07:11

A highly concerning security loophole was recently discovered in a WordPress plugin called "Email Subscribers by Icegram Express," a popular tool utilized by a vast network of over 90,000+ websites. Officially designated as CVE-2024-2876 with a CVSS score of 9.8 (critical), the vulnerability represents a significant threat as it exposes numerous websites to potential attacks. [...]

The post Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites? appeared first on Wallarm.

The post Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites? appeared first on Security Boulevard.

❌
❌