article thumbnail

SonicWall Patches GMS Flaws to Block Data Breaches and Bypass Attacks

Penetration Testing

SonicWall has released a security patch for its Global Management System (GMS) software, addressing two vulnerabilities that could be exploited by attackers to gain unauthorized access to sensitive data (CVE-2024-29010) and bypass authentication mechanisms... The post SonicWall Patches GMS Flaws to Block Data Breaches and Bypass Attacks (..)

article thumbnail

Dropbox Sign Data Breach: What You Need to Know and How to Protect Yourself

Penetration Testing

Dropbox confirmed a security breach on April 24th within its Dropbox Sign (formerly HelloSign) service, exposing customer data including email addresses, usernames, phone numbers, and hashed passwords.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Warns of IDOR Vulnerabilities Abused for Data Breaches

SecureWorld News

However, as these applications handle sensitive user data, they have also become attractive targets for cybercriminals seeking unauthorized access or manipulation of personal information. This enables malicious actors to manipulate URLs or other inputs and gain access to data they should not be authorized to see.

article thumbnail

CakePHP Application Cybersecurity Research – Forgotten Endpoint: Authentication bypass with /open prefix

Zigrin Security

One of the most effective ways to identify vulnerabilities in web applications is through web application penetration testing. The goal is to identify vulnerabilities and weaknesses that attackers could exploit to gain unauthorized access, steal sensitive data, or disrupt operations.

article thumbnail

Retail giant Home Depot agrees to a $17.5 million settlement over 2014 data breach

Security Affairs

million settlement in a multi-state investigation of the data breach that the company suffered in 2014. million settlement over the 2014 data breach. In 2014, Home Depot revealed that the data breach impacted 56 million customers across the US and Canada. SecurityAffairs – hacking, Data breach).

Retail 124
article thumbnail

ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices

The Last Watchdog

The attacker claims to have compromised an end-of-lifed GPRS system that was exposed to the internet and was able to pivot from it to the internal network, where they were able to launch a brute force authentication attack against internal systems. Most immediately is the ubiquity of 2-factor authentication.

Mobile 307
article thumbnail

What are the Mobile App Security Best Practices

CyberSecurity Insiders

Developers should follow best practices such as using strong encryption algorithms, sanitizing user input, validating user input on the server-side, and using secure authentication mechanisms. 2. Secure Data Storage- Mobile applications store sensitive user data such as login creden-tials, personal information, and payment details.

Mobile 117