Aggregator
CVE-2024-11784 | Sell Tickets Online Plugin up to 3.0.2 on WordPress cross site scripting
CVE-2024-11297 | Page Restriction Plugin up to 1.3.6 on WordPress information disclosure
CVE-2020-6923 | HP Linux Imaging and Printing Software buffer overflow
CVE-2024-54150 | xmidt-org cjwt up to 2.2.x JSON Web Token alg signature verification
CVE-2024-56200 | nexryai altair prior 12.24Q4.1 Image Proxy resource consumption
CVE-2024-52897 | IBM MQ Appliance 9.3 CD/9.3 LTS/9.4 LTS information exposure
CVE-2021-22501 | OpenText Operations Bridge Manager up to 2020.10 xml external entity reference
CVE-2024-49336 | IBM Security Guardium 11.5 server-side request forgery
CVE-2024-52896 | IBM MQ Appliance 9.3 CD/9.3 LTS/9.4 CD/9.4 LTS information exposure
CVE-2024-51471 | IBM MQ Appliance 9.3 CD/9.3 LTS/9.4 LTS Trace out-of-bounds
Android malware found on Amazon Appstore disguised as health app
What Is Privilege Escalation? Types, Examples, and Prevention
Privilege escalation is a critical cybersecurity threat in which a user—usually a malicious actor—gains access to data beyond what their account permissions allow. Attackers can gain this access through human error, stolen credentials, or social engineering.
The post What Is Privilege Escalation? Types, Examples, and Prevention appeared first on Security Boulevard.
Detection as Code: Key Components, Tools, and More
As software development accelerates, the need to identify threats and respond in real time is greater than ever. Detection as Code (DaC) allows you to write, maintain, and automate your threat detection logic as if it were software code, making security a built-in part of the development pipeline.
The post Detection as Code: Key Components, Tools, and More appeared first on Security Boulevard.
Medusa Blog
Kubernetes Secrets: How to Create and Use Them
Kubernetes, also known as K8s, is a powerful platform for orchestrating containers in complex, distributed environments. Among its many features, Kubernetes has Secrets, which safeguard sensitive information like API keys, passwords, and tokens in a cluster. By separating confidential data from application code, Kubernetes Secrets reduce the risk of exposure during workflows and deployments.
The post Kubernetes Secrets: How to Create and Use Them appeared first on Security Boulevard.