NETSCOUT cybersecurity, attacks resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

GitHub Vulnerability Put Code Packages at Risk of Repojacking

A new vulnerability found in GitHub’s operations could have given bad actors another way of getting around the code hosting platform’s security protections and exposing thousands of code packages to being hijacked ...
Security Boulevard
vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

In the Dark About Supply Chain Vulnerabilities

The software supply chain can create a seemingly endless attack surface. Here’s what you can do to better protect it. Is the “Barium” hacking collective Chinese? Russian? North Korean? It really doesn’t ...
Security Boulevard
Sound Hijacking – Abusing Missing XFO

Sound Hijacking – Abusing Missing XFO

| | hijacking
A Clickjacking attack works by loading a malicious website inside a low-opacity iframe and overlaying it with an innocuous looking button, checkbox or link. This tricks the user into interacting with the ...

Violent Piracy in Southeast Asia – A Feature of the Past?

ReCaap’s July 2018 Monthly Report recorded not only a year-on-year decline in piracy incidents for January to July compared to 2017, but also a significant reduction in the number of violent incidents ...

Gulf of Guinea: Mother ships used to target vessels deep offshore

PDF Download An approach by a pirate action group (PAG) using a mother ship approximately 280NM south of Lomé, Togo, during July marked the furthest offshore incident recorded by NYA since 17 ...