Tag
#log4j
There's never enough time or staff to scan code repositories. To avoid dependency confusion attacks, use automated CI/CD tools to make fixes in hard-to-manage software dependencies.
The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.
CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here's why it was important.
Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
ThingsBoard 3.4.1 could allow a remote attacker to gain elevated privileges because hard-coded service credentials (usable for privilege escalation) are stored in an insecure format. (To read this stored data, the attacker needs access to the application server or its source code.)
Open source software dependencies are affecting the software security of different industries in different ways, with mature industries becoming more selective in their open source usage.
Despite increased threats, an uncertain economy, and increasing automation, your organization can still thrive.
Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets.
The startup's software helps organizations secure their containers in the cloud by teasing out which packages are running and which are vulnerable.
Possible RCE and denial-of-service issue discovered in Kafka Connect