Thousands of Buggy BeyondTrust Systems Remain Exposed

Researchers reveal that nearly 9,000 BeyondTrust instances remain exposed to the internet, posing significant security risks to organizations. This comes in the wake of a critical vulnerability discovery and a…

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns The U.S. Treasury Department has imposed sanctions on Integrity Technology Group, a Beijing-based cybersecurity firm, due to its involvement in…

Advent of Cyber 2024 DAY 22

Advent of Cyber 2024 Day 22: A Developer’s Perspective Auth By: TRedEye As the cybersecurity landscape continues to evolve, developers find themselves at the frontline of protecting their applications and…

Kubernetes, Rust, Linux and DOS? The Year in Open Source

The open source community made significant strides in 2024, featuring noteworthy developments in Kubernetes, Rust, Linux, and a resurgence of discussions around DOS. For developers keen on leveraging these innovations,…

Attack Exposure: Unpatched Cleo Managed File-Transfer Software

Attack Exposure: Unpatched Cleo Managed File-Transfer Software Security analysts have identified a critical concern for developers overseeing Cleo managed file-transfer (MFT) software. More than 200 instances of this software remain…

Watch Now: Navigating Your OT Cybersecurity Journey: From Assessment to Implementation

Navigating Your OT Cybersecurity Journey: From Assessment to Implementation In today’s digitized industrial landscape, operational technology (OT) environments face a growing array of cyber threats. For developers working in these…

Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677

Recent research has spotlighted the Apache Struts vulnerability CVE-2024-53677, with malicious actors actively attempting to exploit this weakness. As a developer, understanding the implications of such vulnerabilities is crucial, not…

Vulnerabilities Abound: Three Ways to Stay Ahead of Attackers

In an era where cyber threats continually evolve, understanding how to proactively safeguard applications and infrastructure is paramount for developers. Gaurav Banga of Balbix outlines three essential strategies to bolster…

CISA Urges Use of End-to-End Encrypted Messaging Services like Signal, Following U.S. Telecoms Hack

CISA Urges Use of End-to-End Encrypted Messaging Services like Signal, Following U.S. Telecoms Hack The Cybersecurity and Infrastructure Security Agency (CISA) has recently emphasized the urgent need for government officials…

Fortinet Warns of Critical Vulnerabilitiy Allows Command Injection & File Read

Fortinet Warns of Critical Vulnerabilities Allowing Command Injection & File Read In the realm of network security, Fortinet’s latest security advisory raises significant concerns for developers working with FortiManager and…