hijacking
GitHub Vulnerability Put Code Packages at Risk of Repojacking
A new vulnerability found in GitHub’s operations could have given bad actors another way of getting around the code hosting platform’s security protections and exposing thousands of code packages to being hijacked ...
In the Dark About Supply Chain Vulnerabilities
The software supply chain can create a seemingly endless attack surface. Here’s what you can do to better protect it. Is the “Barium” hacking collective Chinese? Russian? North Korean? It really doesn’t ...
Sound Hijacking – Abusing Missing XFO
A Clickjacking attack works by loading a malicious website inside a low-opacity iframe and overlaying it with an innocuous looking button, checkbox or link. This tricks the user into interacting with the ...
Violent Piracy in Southeast Asia – A Feature of the Past?
ReCaap’s July 2018 Monthly Report recorded not only a year-on-year decline in piracy incidents for January to July compared to 2017, but also a significant reduction in the number of violent incidents ...
Gulf of Guinea: Mother ships used to target vessels deep offshore
PDF Download An approach by a pirate action group (PAG) using a mother ship approximately 280NM south of Lomé, Togo, during July marked the furthest offshore incident recorded by NYA since 17 ...