Email:

Phone No.

Whatsapp

Blog

Dev Corrupts NPM Libs ‘colors’ and ‘faker’ Breaking Thousands of Apps
Dev Corrupts NPM Libs ‘colors’ and ‘faker’ Breaking Thousands of Apps
Dev Corrupts NPM Libs ‘colors’ and ‘faker’ Breaking Thousands of Apps
Dev Corrupts NPM Libs ‘colors’ and ‘faker’ Breaking Thousands of Apps

Dev Corrupts NPM Libs ‘colors’ and ‘faker’ Breaking Thousands of Apps

Dev Corrupts NPM Libs ‘colors’ and ‘faker’ Breaking Thousands of Apps Users of popular open-source libraries ‘colors’ and ‘faker’ were left stunned after they saw their applications, using these libraries, printing gibberish data and breaking. Some surmised if the NPM libraries had been compromised, but it turns out there’s much more to the story. The developer

The necessity of conducting penetration testing and vulnerability assessment

Conducting penetration testing and vulnerability assessment According to Trustwave’s 2018 Global Security Report, all online apps are vulnerable to attack. Every application had at least one vulnerability with an average of eleven discovered per application. In addition, the research found a significant rise in the number of vulnerabilities disclosed in 2017. This is mostly due

Trojanized DnSpy App Drops Malware Cocktail on Researchers, Devs

Trojanized DnSpy App Drops Malware Cocktail on Researchers, Devs Hackers targeted cybersecurity researchers and developers this week in a sophisticated malware campaign distributing a malicious version of the dnSpy .NET application to install cryptocurrency stealers, remote access trojans, and miners. dnSpy is a popular debugger and .NET assembly editor used to debug, modify, and decompile

Rapid Window Title Changes Cause ‘white screen of death’

Rapid Window Title Changes Cause ‘white screen of death’ Experimentation with ANSI escape characters on terminal emulators has led to the discovery of multiple high-severity DoS (denial of service) vulnerabilities on Windows terminals and Chrome-based web browsers. Eviatar Gerzi, a security researcher at CyberArk, has tried out various potential abuse pathways based on an old 2003

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us