Akamai offers post-mortem on recently resolved authentication platform vulnerability
Lasso bug roped up and corralled by Enterprise Application Access developers [...]
Lasso bug roped up and corralled by Enterprise Application Access developers [...]
Second Circuit opinion may have a sizeable impact on the US legal landscape, writes David Oberly [...]
APT29 accused of compromising USAID email account [...]
Company points finger after cyber-attack on US and Australian offices [...]
Software maintainers downplay real-world impact of JWT vulnerability [...]
Researchers used custom URL schemes to achieve XSS and a sandbox escape [...]
New web targets for the discerning hacker [...]
Read on for page-turning pwnage [...]
Twilio security pros take aim at leaky commits [...]
Fintech firm rules out external attack [...]
Supreme Court judges affirm lower court decision to uphold privacy of its nine million users [...]
Risk posed by Ruby Gem Dragonfly flaws is unarguable [...]
Names and postal addresses leak blamed on malware attack [...]
Home Network Security Station flaws exposed by Cisco Talos researchers [...]
Inherent weaknesses in short-range radio technology laid bare [...]
CSRF risk factors are often hidden, and misunderstood, in GraphQL implementations [...]
High-value credit card and Social Security numbers were among datasets available on now-defunct website [...]
Unauthorized intrusion detected by Rehoboth McKinley Christian Health Care Services [...]
Medium-impact flaws combined to create ‘upstream attack platform’ [...]
Attacks could put ‘millions of users’ at risk [...]
Katie Paxton-Fear tells The Daily Swig she has appealed the decision [...]
DoS-style attacks can slow deep neural networks to a crawl [...]
Filters Fast agrees to pay New York Attorney General [...]
Filters Fast agrees to pay New York Attorney General [...]
If exploited, the security flaws allowed pre-authenticated RCE [...]