Chromium bug allowed SameSite cookie bypass on Android devices

Ben Dickson 27 February 2023 at 11:50 UTC Recent advancements in security measures against cross-site request forgery have revealed potential vulnerabilities that could be exploited. A recently patched vulnerability within the Chromium project has the potential to allow malicious individuals to bypass a protective feature designed to safeguard sensitive cookies on Android browsers. The SameSite…

Read More

Password managers: A rough guide to enterprise secret platforms

The second installment of our password manager series explores advanced solutions suitable for businesses to manage API tokens, login details, and much more. Modern businesses operate numerous servers, services, applications, APIs, containers, and other technologies. To protect these assets, organizations require tools for managing sensitive information, such as passwords, encryption keys, SSH (Secure Shell) keys,…

Read More

Password managers: A rough guide to enterprise secret platforms

The second installment of our password manager series delves into enterprise-level technology designed to effectively manage API tokens, login credentials, and similar resources. Modern organizations operate a vast array of servers, services, applications, APIs, containers, and other technologies. To safeguard these resources, organizations require tools to manage sensitive information, encompassing passwords, encryption keys, SSH (secure…

Read More

Password managers: A rough guide to enterprise secret platforms

The second installment of our password manager series delves into advanced technologies for businesses to effectively manage API tokens, login credentials, and more. In today’s modern environments, enterprises often operate numerous servers, applications, APIs, and other technological solutions. To safeguard these assets, organizations require robust tools to manage secrets such as passwords, encryption keys, SSH…

Read More

Indian transport ministry flaws potentially allowed creation of counterfeit driving licenses

Charlie Osborne28 February 2023 at 14:15 UTC Updated: 28 February 2023 at 14:51 UTC A cybersecurity researcher has highlighted a serious security issue that has exposed the personal identifiable information (PII) of approximately 185 million citizens in India. This vulnerability allows the potential creation of counterfeit driving licenses. An investigative report by student and cybersecurity…

Read More

Indian transport ministry flaws potentially allowed creation of counterfeit driving licenses

Charlie Osborne28 February 2023 at 14:15 UTC Updated: 28 February 2023 at 14:51 UTC A researcher has uncovered significant vulnerabilities that allowed access to the personal information of approximately 185 million citizens in India, enabling the creation of counterfeit driving licenses. An image relevant to this situation can be found below: Recently, cybersecurity researcher Robin…

Read More

Bug Bounty Radar // The latest bug bounty programs for March 2023

Emerging Web Targets for Expert Hackers The introduction of a nationwide safe harbor agreement last month has made Belgium a hotspot for ethical hackers. This framework allows dedicated security researchers to report computer security vulnerabilities in any Belgian system without fear of legal repercussions, provided they adhere to specific conditions and rules of conduct. These…

Read More

Application Development Guidance: Introduction

Fundamental Guidance Principles This guidance aims to mitigate the risk of data loss classified as OFFICIAL by providing secure development practices. It encompasses general application development advice along with platform-specific guidance. The principles outlined below are integral to this approach: Applications that store, process, or access protectively marked information must adhere to specific security requirements…

Read More

Why vulnerabilities are like buses

There’s an old adage that you may wait for a bus for an extended period, only to find that several arrive at once. A notable trend in cybersecurity is the widespread exploitation of a significant vulnerability in a software product, which is typically followed by additional critical vulnerabilities, often exploited in the wild within the…

Read More

Common Cyber Attacks: Reducing the Impact

Overview of Common Cyber Attacks The document “Common Cyber Attacks: Reducing The Impact” serves as a resource for organizations to understand the nature of typical cyber attacks and underscores the necessity for establishing fundamental security measures to defend against them. You can download the complete version at the bottom of this page (PDF). This paper…

Read More
Back To Top