Month: November 2021

According to a new report conducted by Cloudentity, 44% of respondents have experienced at least substantial API authorization issues concerning privacy, data leakage, and object property exposure with one or both of internal and external-facing APIs. Additionally, 97% of respondents reported that identity and authorization issues with services and APIs have had a direct impact
0 Comments
A now-patched critical remote code execution (RCE) vulnerability in GitLab’s web interface has been detected as actively exploited in the wild, cybersecurity researchers warn, rendering a large number of internet-facing GitLab instances susceptible to attacks. Tracked as CVE-2021-22205, the issue relates to an improper validation of user-provided images that results in arbitrary code execution. The
0 Comments
There are many things the COVID-19 pandemic has helped bring into the mainstream, including an accelerated adoption of technology by individuals and enterprises. More people today appear interested in leveraging technology to work from home. Enterprises, too, are adopting or trying new technologies for a smooth transition. It seems the day is not far when
0 Comments
Chromebooks and tablets recorded their first quarterly decline in shipments since the onset of the pandemic in 2020, the latest IDC report suggests. While Chromebook shipments declined 29.8 percent year over year in the third quarter of 2021, the tablet shipments recorded a 9.4 percent year-over-year decline. Chromebook shipment volume dropped to 6.5 million units
0 Comments
According to a new survey by Entrust, only 31% of employees at enterprise companies report having received training on ransomware attacks. The survey found that the COVID-19 pandemic drove significant data security training efforts at hybrid workplaces around the world. The vast majority of enterprise business leaders who responded (81%) said their company had offered
0 Comments
A novel class of vulnerabilities could be leveraged by threat actors to inject visually deceptive malware in a way that’s semantically permissible but alters the logic defined by the source code, effectively opening the door to more first-party and supply chain risks. Dubbed “Trojan Source attacks,” the technique “exploits subtleties in text-encoding standards such as
0 Comments
In this article BABA 9618-HK Alibaba said its total gross merchandise value (GMV) over the Singles Day event, which spanned 11-days, totalled 498.2 billion yuan or $74.1 billion. That beat last year’s 268.4 billion yuan figure. Alibaba GUANGZHOU, China — The biggest shopping event in the world, Singles Day, is underway but China’s e-commerce giants
0 Comments
This post was written by Amit Rosenzweig, CEO of Ottopia. Teleoperation: the technology that enables a human to remotely monitor, assist and even drive an autonomous vehicle. Teleoperation is a seemingly simple capability, yet it involves numerous technologies and systems in order to be implemented safely. In the first article of this series, we established
0 Comments
There is often confusion between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications. CASBs protect sensitive data by implementing multiple security policy enforcements to safeguard critical data. For identifying and classifying sensitive information, like Personally Identifiable Information (PII), Intellectual Property
0 Comments