Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Web Application Penetration Testing Checklist

The proverb, “A stitch in time saves nine,” encapsulates the core of web application security. Businesses must always be one step ahead of attackers and malicious actors to identify vulnerabilities, weaknesses, and misconfigurations in web applications and ensure they are patched and/or fixed before attackers can find and leverage them to orchestrate attacks.

Software Testing Strategies and Approaches for Successful Development

Just Imagine! You have just downloaded a highly anticipated mobile application that promises to simplify your daily tasks. You have heard positive reviews about its functionality and efficiency. As you eagerly tap on the app icon, your excitement turns into frustration. Glitches, crashes, unexpected errors, etc., greet you at every turn. This frustrating experience is a stark reminder of the critical role software testing plays in our digital lives.

Business continuity planning: Looking back or ahead

In September 2023, cybercriminals launched an extensive ransomware attack that disrupted several major businesses in the Las Vegas Casino Business/District. The attack shook the city and stopped consumer goods and services for several hours. The attack influenced security, visitor services, and financial activities. Businesses lost money and long-term reputational risks ensued.

Blockchain Security: Understanding vulnerabilities and mitigating risks

In recent years, blockchain technology has garnered significant attention thanks to its remarkable tamper-proof features and robust security. It is also expected that the blockchain technology market will exceed 1.2 billion US dollars by 2030, with an annual growth rate of 82.8 percent. However, recent headlines have exposed numerous vulnerabilities and cyberattacks targeting blockchain technology.

Cyber Insurance Report: Breach Frequency Down, Breach Severity Up

The past half-decade has been a particularly tumultuous one for cybersecurity. It has borne witness to some of the most damaging attacks in history, unprecedentedly high data breach rates, and a staggering number of emerging threat groups. However, a new report from cyber insurance provider Coalition suggests that things are beginning to stabilize.

6 Steps for CIOs To Keep Their IT Staff Happy

According to a recent Yerbo survey, 40% of IT professionals are at high risk of burnout. In fact, and perhaps even more alarming, 42% of them plan to quit their company in the next six months. And yet, according to Deloitte, 70% of professionals across all industries feel their employers are not doing enough to prevent or alleviate burnout. CIOs should take this statistic seriously.

CrowdStrike Services Offers Incident Response Executive Preparation Checklist

Within your incident response plan, there typically is (or should be) a trigger to notify your executive team of an impending crisis. While many organizations believe they’ve worked out the logistics of gathering leadership on the phone, getting decisions made, and garnering their support for your proposed response plan, they often find out in the heat of an incident that the leadership team is miles apart in your understanding of what happens next.

CVE-2023-20198: Actively Exploited Privilege Escalation Vulnerability in Cisco IOS XE

On October 16, 2023, Cisco published a security advisory regarding an actively exploited and unpatched privilege escalation vulnerability in the Web UI feature of the Cisco IOS XE operating system, both physical and virtual. The vulnerability could allow a remote, unauthenticated threat actor to create an account with maximum privileges (privilege level 15 access) on the affected device. Due to these factors, Cisco has given this vulnerability the maximum possible CVSS score of 10.

Data Exposure Misconfiguration Issue in ServiceNow (Potential Public List Widget Misconfiguration)

On October 18, 2023, ServiceNow published a knowledge base article revealing that they are aware of reporting that details a potential misconfiguration issue. This issue lies in the Access Control Lists (ACL) within ServiceNow that if misconfigured could result in unauthenticated threat actors being able to access data. The issue was discovered by a security engineer at AppOmni, and was disclosed in a blog to the public on October 14, 2023.