Virtual Private Networks (VPNs) in recent years have become a constant companion of all those who value their privacy and the security of personal data when browsing the Internet. The...
Even though we have so many internal and external threats to our databases, in this tutorial we will only cover a few of them. #1. Unrestricted database privileges This typically...
Penetration testing is the process of finding vulnerabilities, flaws, malicious content, risks, etc.During this process, the organization’s IT infrastructure is strengthened. At the same time, a penetration test helps...
Corrective releases of distributed source control system Git 2.39.1, 2.38.3, 2.37.5, 2.36.4, 2.35.6, 2.34.6, 2.33.6, 2.32.5, 2.31.6 and 2.30.7 have been published, in which eliminated two vulnerabilities that allow...
The developers of the OpenBSD project have published the release of Got 0.80 (Game of Trees) version control system, which focuses on ease of design and use. To store...
A critical vulnerability (CVE-2022-47939) has been identified in the ksmbd module, which includes an implementation of a file server based on the SMB protocol built into the Linux kernel....
The final selection of the most important and notable events in 2022 related to open projects and information security: Conflicts: A split among the founders of the elementary OS...
A group of researchers from several Chinese scientific centers and universities proposed a new way to optimize the factorization process of RSA-key parameters on quantum computers. According to the...
Several vulnerabilities have been identified in the J-Web web interface, which is used in Juniper network devices equipped with the JunOS operating system , the most dangerous of which...
At a recent Black Hat, there was an interesting presentation about the possibility of obtaining various information from third-party sites using a simple attack – Cross Site Scripting Inclusion (XSSI). If...