Remove top-10-cybersecurity-vulnerabilities
article thumbnail

Understanding the OWASP API Security Top 10: Why BOLA is the Number One Risk for APIs

Security Boulevard

Understanding and addressing vulnerabilities is critical in cybersecurity, where APIs serve as the backbone for seamless data exchange. The OWASP API Security Top 10, revised in 2023, provides a comprehensive guide to the critical issues that organizations must tackle to ensure the robust security of their APIs.

Risk 64
article thumbnail

Counting Down the Top 10 Most Popular SiteLock Blogs in 2018

SiteLock

Whatever the reason, make 2019 the year you resolve to put cybersecurity first. There is a lot of information on the web on this subject and with 155 SiteLock blogs published in 2018 alone–that’s a lot content to search through! Join us as we countdown the top 10 most popular SiteLock blogs in 2018!

Malware 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers

The Last Watchdog

Web application attacks directed at organizations’ web and mail servers continue to take the lead in cybersecurity incidents. In the report’s findings, stolen credentials and exploited vulnerabilities are the top reasons for web breaches. Exploited vulnerabilities were the second leader at almost 20 percent.

Hacking 201
article thumbnail

GUEST ESSAY: The case for network defenders to focus on leading — not lagging — indicators

The Last Watchdog

In cybersecurity we often face a bias towards lagging indicators, unfortunately. Cybersecurity nuances. One could argue that the true lagging indicator in cybersecurity is a breach, and that anything that helps prevent a breach, like adopting a “ shift left ” philosophy as part of a DevSecOps initiative, is a leading indicator.

CISO 240
article thumbnail

15 Best Cybersecurity Blogs To Read

Spinone

Cybersecurity is one of the most dynamic and quick-changing industries. The best way to stay up-to-date with the recent trends is by reading the top cybersecurity blogs. Here’s our list of the best cybersecurity blogs to read and follow. The blog has sections for both individual and business users.

article thumbnail

Apache Log4j Zero Day Exploit Puts Large Number of Servers at Severe Risk

eSecurity Planet

A critical vulnerability in the open-source logging software Apache Log4j 2 is fueling a chaotic race in the cybersecurity world, with the Apache Software Foundation (ASF) issuing an emergency security update as bad actors searched for vulnerable servers. release of Log4j 2 that fixes the RCE vulnerability.

Risk 134
article thumbnail

Phishing attacks use an old Microsoft Office flaw to spread Agent Tesla malware

Security Affairs

Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882, to spread the Agent Tesla malware. Threat actors are exploiting an old Microsoft Office vulnerability, tracked as CVE-2017-11882 (CVSS score: 7.8), as part of phishing campaigns to spread the Agent Tesla malware.

Malware 95