article thumbnail

Top 10 web application vulnerabilities in 2021–2023

SecureList

More than a third (39%) used the microservice architecture. Mitigation: do not store files containing sensitive data, such as passwords or backups, in web application publish directories. Server-Side Request Forgery (SSRF) The popularity of the cloud and microservice architectures is on the rise.

Passwords 107
article thumbnail

What Real-Life SaaS Attack Misconfiguration Exploits Can Teach Us

IT Security Guru

There are a few notable exploited misconfigurations, from default built-in file sharing, and lack of password enforcement, albeit no password to multi-factor authentication (MFA), to the risks of legacy protocols and OAuth apps, that can bring a little clarity to understanding the complex landscape that is a company’s SaaS security posture.

CISO 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

API Security for the Modern Enterprise

IT Security Guru

Microservices Architecture has Created a Security Blind Spot. When you have multiple services communicating with each other through APIs, then your entire system becomes exposed when any one service gets hacked. password guessing). Microservices communicate over APIs. API Security Tools.

DDOS 114
article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

The certification covers active defense, defense in depth, access control, cryptography, defensible network architecture and network security, incident handling and response, vulnerability scanning and penetration testing, security policy, IT risk management, virtualization and cloud security , and Windows and Linux security.

article thumbnail

XMR crypto miner switches from arm IoT devices to X86/I686 Intel servers

Security Affairs

“This one seems to target enterprise systems.” ” The expert explained that the XMR cryptominer was optimized for Intel x86 (both 32bit or 64bit architecture) and Intel 686 processors. System administrators need to employ security best practices with the systems they manage.”

IoT 87
article thumbnail

A guide to OWASP’s secure coding

CyberSecurity Insiders

Furthermore, whether developing software for portable gadgets, desktop systems, or servers, secure coding is critical for modern software development. According to the Software Engineering Institute, software architecture or coding flaws are responsible for up to 90% of security problems. Authentication and password management.

article thumbnail

Best Privileged Access Management (PAM) Software for 2022

eSecurity Planet

It does provide clustering and high availability functions, however, it relies on high availability for Disaster Recovery (DR) scenarios and lacks a true “break glass” capability to allow access to passwords in emergency situations. It integrates with Office 365, Google Workspace, Okta and more for both cloud-based and on-premises systems.

Software 136