article thumbnail

Top 10 web application vulnerabilities in 2021–2023

SecureList

More than a third (39%) used the microservice architecture. Server-Side Request Forgery (SSRF) The popularity of the cloud and microservice architectures is on the rise. One-Time Passwords and authentication against various resources, such as accounts or file systems, were some of the mechanisms we found to be vulnerable.

Passwords 100
article thumbnail

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

It guides system administrators and developers of National Security Systems on how to deploy Kubernetes with example configurations for the recommended hardening measures and mitigations. Use log auditing so that administrators can monitor activity and be alerted to potential malicious activity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

API Security for the Modern Enterprise

IT Security Guru

Microservices Architecture has Created a Security Blind Spot. When you have multiple services communicating with each other through APIs, then your entire system becomes exposed when any one service gets hacked. Microservices are small, modular, independent services that can be deployed, scaled, and updated independently.

DDOS 114
article thumbnail

CSPM vs CWPP vs CIEM vs CNAPP: What’s the Difference?

eSecurity Planet

Identity discrepancies in account entitlements led to the rise of Cloud Infrastructure Entitlement Management (CIEM) a few years later, and in the last two years Cloud Native Application Protection Platforms (CNAPP) have emerged to tie together CWPP, CSPM and CIEM into a comprehensive cloud security platform.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

In this role, Diane is accountable for the security of the retail stores, cyber-security, infrastructure, security/network engineering, data protection, third-party risk assessments, Directory Services, SOX & PCI compliance, application security, security awareness and Identity Management. Director/CISO of IT Risk Management. Ulta Beauty.

article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

Applications have become more complex, their architecture better. It could be compromised directly or by hacking the account of someone with access to the website management. System administrators that take care of physical networks are no longer needed — with cloud services management being an easy task.

article thumbnail

Facebook May Have Gotten Hacked, and Maybe It’s Better We Don’t Know

Adam Levin

Facebook’s Two-Factor Authentication phone numbers exposed: After prompting users to provide phone numbers to secure their accounts, Facebook allows anyone to look up their account by using them. Denying anything happened gives system administrators more time to identify and patch newly discovered vulnerabilities.

Hacking 100