UK Pub Chain ‘Greene King’ Gift Card Website Hacked

Major UK pub chain, Greene King (Bury St. Edmunds), had its gift card website (https://www.gkgiftcards.co.uk) compromised by hackers. The personal data breach was discovered on 14th May 2019 and confirmed a day later. The pub, restaurant and hotel chai… Continue reading UK Pub Chain ‘Greene King’ Gift Card Website Hacked

How are code quality and code security related?

Code quality and code security aren’t the same, but they’re closely related. And in the current cyberthreat environment, developers should care about both.
The post How are code quality and code security related? appeared first on Software… Continue reading How are code quality and code security related?

How Business can address the Security Concerns of Online Shoppers

It’s no secret that cybersecurity is an epidemic problem that affects online businesses on a global scale. E-commerce businesses are especially affected by data breaches because it weakens the consumer’s trust in online businesses to protec… Continue reading How Business can address the Security Concerns of Online Shoppers

Finance knocks business and professional services off top spot in four most attacked industries

Finance is the most attacked sector in EMEA, accounting for 30% of all attacks – compared to 17% globally, according to NTT Security. It knocks business and professional services off the top spot, which was last year’s most attacked sector at 20%. The … Continue reading Finance knocks business and professional services off top spot in four most attacked industries

Identify web application vulnerabilities and prioritize fixes with Netsparker

In this Help Net Security podcast, Ferruh Mavituna, CEO at Netsparker, talks about web application security and how Netsparker is helping businesses of any size keep their web applications secure. Here’s a transcript of the podcast for your convenience… Continue reading Identify web application vulnerabilities and prioritize fixes with Netsparker

Bug bounties: A good tool, but don’t make them the only tool in security

Bug bounty programs are becoming more popular. Do they work? What are the pitfalls of crowdsourcing application security testing? Our experts weigh in. The original version of this post was published in Forbes. Bug bounties are hot. They are everywhere… Continue reading Bug bounties: A good tool, but don’t make them the only tool in security

F5 Networks Acquires NGINX For $670 Million

One of the most important software companies NGINX, which is also behind the very popular open-source web server of the same name, is being acquired by its rival, F5 Networks, in a deal valued at about $670 million.

While NGINX is not a name that you … Continue reading F5 Networks Acquires NGINX For $670 Million

Severe Flaw Disclosed In StackStorm DevOps Automation Software

A security researcher has discovered a severe vulnerability in the popular, open source event-driven platform StackStorm that could allow remote attackers to trick developers into unknowingly execute arbitrary commands on targeted services.

StackStorm… Continue reading Severe Flaw Disclosed In StackStorm DevOps Automation Software

Most Magento shops get compromised via vulnerable extensions

Vulnerable third party extensions (modules) are now the main source of Magento hacks, says security researcher and Magento forensics investigator Willem de Groot. “The method is straightforward: attacker uses an extension bug to hack into a Magen… Continue reading Most Magento shops get compromised via vulnerable extensions

Top 10 software vulnerability list for 2019

The common software vulnerabilities on our top 10 software vulnerability list for 2019 are easy to find and fix with the right AppSec tools and guidance. In a perfect world, all software would be without flaws or weaknesses. Or at least software vulner… Continue reading Top 10 software vulnerability list for 2019