article thumbnail

Remote code execution bug discovered in the popular JsonWebToken library

Security Affairs

The open-source jsonwebtoken (JWT) library is affected by a high-severity security flaw that could lead to remote code execution. The open-source JsonWebToken ( JWT ) library is affected by a high-severity security flaw, tracked as CVE-2022-23529 (CVSS score: 7.6), that could lead to remote code execution.

article thumbnail

GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape

The Last Watchdog

Lack of security awareness and education. Often, employees within organizations lack sufficient security awareness and education. Moreover, outdated software components and libraries can introduce security risks into the overall system. Promote security awareness and education among employees.

Risk 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

QR Codes: A Growing Security Problem

eSecurity Planet

Also, many open source packages and libraries can generate malformed QR codes and encode common exploits, such as cross-site scripting (XSS) , local file inclusion (LFI), directory traversal , or SQL injection. Also read: How to Defend Common IT Security Vulnerabilities.

Security 113
article thumbnail

Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind

Lenny Zeltser

In addition to documenting expectations, the discussions that lead to creating a responsibility matrix can surface disagreements or coverage gaps so the organization has the opportunity to address them.

article thumbnail

Types of cyberthreats

IBM Big Data Hub

One of the best-known zero-day vulnerabilities is Log4Shell , a flaw in the widely-used Apache Log4j logging library. Staying ahead of cyberattacks Strong passwords , email security tools, and antivirus software are all critical first lines of defense against cyberthreats.

Phishing 112
article thumbnail

Security Outlook 2023: Cyber Warfare Expands Threats

eSecurity Planet

By listing every software component and library that went into building an application, as well as services, dependencies, compositions and extensions, SBOMs provide critical visibility that will speed their adoption, DigiCert predicted.

Security 145
article thumbnail

12 Types of Vulnerability Scans & When to Run Each

eSecurity Planet

Source code scanners examine software applications’ source code for security flaws, coding mistakes, and vulnerabilities. They look for possible vulnerabilities such as input validation errors, improper coding practices, and known susceptible libraries in the codebase.

Cloud 95