article thumbnail

VulnRecap 1/8/24 – Ivanti EPM & Attacks on Old Apache Vulnerabilities

eSecurity Planet

The new year brought few new vulnerabilities, and only Ivanti Endpoint Manager (EPM) and Kyber, the quantum resistant encryption algorithm, publicized new vulnerabilities or fixes. and older of the Perl Spreadsheet::ParseExcel library ( CVE-2023-7101 ) contain a RCE vulnerability exploited by Chinese hackers, as noted on December 24th.

article thumbnail

Security Affairs newsletter Round 459 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Datacenter Proxies: Choosing the Right Option CISA adds Roundcube Webmail Persistent XSS bug to its Known Exploited Vulnerabilities catalog Canada Gov plans to ban the Flipper Zero to curb car thefts ExpressVPN leaked DNS requests due to a bug in the split tunneling feature 9 Possible Ways Hackers Can Use Public Wi-Fi to Steal Your Sensitive Data US (..)

Security 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Container Security? Complete Guide

eSecurity Planet

Container registry security tools help users manage image-level security, adjust user privileges, scan images for vulnerabilities, audit image libraries to identify outdated or problematic images, and mitigate supply chain risks. Some common examples of container registries include Docker Hub, Azure Container Registry, and Amazon ECR.

Security 113
article thumbnail

Patch Tuesday, December 2019 Edition

Krebs on Security

Handy in that respect is CVE-2019-1468 , a similarly widespread critical issue in the Windows font library that could be exploited just by getting the user to visit a hacked or malicious Web site. But if you’re still depending on Windows XP for remote access, you likely have bigger security concerns.

Libraries 148
article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

Also read: Database Security: 7 Best Practices & Tips Use better and unique passwords to protect your data from breaches, reduce identity theft, and better protect sensitive and personal information. CNAP provides encryption, access control, threat detection and response features for enhanced security.

article thumbnail

What Is API Security? Definition, Fundamentals, & Tips

eSecurity Planet

Fundamentals of API Security API security includes a range of tactics such as strict authentication and authorization methods, data encryption technologies, and strong access controls. Source: Curity Tips on How to Avoid API Attacks API attacks are among the most common and damaging cybersecurity issues.

Security 109
article thumbnail

Common IT Security Vulnerabilities – and How to Defend Against Them

eSecurity Planet

Missing data encryption. When your data is not properly encrypted before storage or transmission, your vulnerability to a cyber threat increases. Solution : While many software solutions exist to assist you with data encryption, you’ll need to find an encryption solution that meets your needs. How to Prevent DOS Attacks.

IT 66