Here’s a New Tool That Scans Open-Source Repositories for Malicious Packages

The Open Source Security Foundation (OpenSSF) has announced the initial prototype release of a new tool that’s capable of carrying out dynamic analysis of all packages uploaded to popular open source repositories.
Called the Package Analysis project, … Continue reading Here’s a New Tool That Scans Open-Source Repositories for Malicious Packages

Posted in Uncategorized

Microsoft Azure Vulnerability Exposes PostgreSQL Databases to Other Customers

Microsoft on Thursday disclosed that it addressed a pair of issues with the Azure Database for PostgreSQL Flexible Server that could result in unauthorized cross-account database access in a region.
“By exploiting an elevated permissions bug in the Fl… Continue reading Microsoft Azure Vulnerability Exposes PostgreSQL Databases to Other Customers

Posted in Uncategorized

Indian Govt Orders Organizations to Report Security Breaches Within 6 Hours to CERT-In

India’s computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily report cybersecurity incidents, including data breaches, … Continue reading Indian Govt Orders Organizations to Report Security Breaches Within 6 Hours to CERT-In

Posted in Uncategorized

Twitter’s New Owner Elon Musk Wants DMs to be End-to-End Encrypted like Signal

Elon Musk, CEO of SpaceX and Tesla and Twitter’s new owner, on Thursday called on adding support for end-to-end encryption (E2EE) to the platform’s direct messages (DM) feature.
“Twitter DMs should have end to end encryption like Signal, so no one can… Continue reading Twitter’s New Owner Elon Musk Wants DMs to be End-to-End Encrypted like Signal

Posted in Uncategorized

U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities

Log4Shell, ProxyShell, ProxyLogon, ZeroLogon, and flaws in Zoho ManageEngine AD SelfService Plus, Atlassian Confluence, and VMware vSphere Client emerged as some of the top exploited security vulnerabilities in 2021.
<!–adsense–>
That’s accord… Continue reading U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities

Posted in Uncategorized

Cloudflare Thwarts Record DDoS Attack Peaking at 15 Million Requests Per Second

Cloudflare on Wednesday disclosed that it acted to mitigate a 15.3 million request-per-second (RPS) distributed denial-of-service (DDoS) attack. The web infrastructure and website security company called it one of the “largest HTTPS DDoS attacks on re… Continue reading Cloudflare Thwarts Record DDoS Attack Peaking at 15 Million Requests Per Second

Posted in Uncategorized