2021 CWE Top 25 Most Dangerous Software Weaknesses
Introduction: The 2021 CWE Top 25 Most Dangerous Software Weaknesses is a demonstrative list of most periodic and critical errors that can lead to major software vulnerabilities. It is developed…
Cyber Security
Introduction: The 2021 CWE Top 25 Most Dangerous Software Weaknesses is a demonstrative list of most periodic and critical errors that can lead to major software vulnerabilities. It is developed…
The U.S. Department of Commerce added four organizations, including Israeli cyberarms industry NSO Group to the Entity List for engaging in malicious cyber activities that are conflicting with the nation’s…
Introduction: The list of 2021 CWE Most Important Hardware Weaknesses is published by the MITRE Corporation in collaboration with DHS’s Cybersecurity and Infrastructure Security Agency (CISA). The composed list consists…
To build and secure 5G Cloud Infrastructures, the first of a four-part series of CyberSecurity Guidance documents has been released jointly by National Security Agency (NSA) and Cybersecurity and Infrastructure…
At the Tianfu Cup 2021 held on October 16-17, 2021, a number of operating systems and products were successfully exploited using original, unreleased vulnerabilities. From Windows 10, Google Chrome, iOS…
Overview: There are several Cyber Security requirements that should be considered before the development of any kind of application. Organizations must ensure that any new software application project or changing…
What is OWASP? The OWASP (Open Web Application Security Project) was established in 2001 as an open-source security community focused on the goal of circulating application security awareness. OWASP is…
Overview: This document defines the structured methodology of Application Threat Modeling used in organizations that identify, enumerate and prioritize mitigations for the security vulnerabilities related to the application. It will…
Introduction: Secure Software Development Life Cycle (S-SDLC) methodology is the need of the hour for the organizations to adapt to ensure that their software is Secured and all the security…
Microsoft has released the patch for actively exploited Zero-Day vulnerability using Microsoft Office documents and MSHTML. Microsoft has associated this vulnerability with CVE-2021-40444. This patch is released as part of…