Tag
#auth
A coalition of digital rights groups is demanding the US declassify records that would clarify just how expansive a major surveillance program really is.
CrushFTP versions prior to 11.1.0 suffers from a directory traversal vulnerability.
TrojanSpy.Win64.EMOTET.A malware suffers from a code execution vulnerability.
Plantronics Hub version 3.25.1 suffers from an arbitrary file read vulnerability.
Backdoor.Win32.AsyncRat malware suffers from a code execution vulnerability.
Chryp version 2.5.2 suffers from a persistent cross site scripting vulnerability.
Leafpub version 1.1.9 suffers from a persistent cross site scripting vulnerability.
Prison Management System Using PHP suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Commercial spyware tools can threaten democratic values by enabling governments to conduct covert surveillance on citizens, undermining privacy rights and freedom of expression.
Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some form of 2-factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication sophistication to adequately safeguard organizational data. When deploying