Saas user permission feature explained

Following the activities of threat actors all over the world, software as a service (SaaS) and user permissions via role-based account control (RBAC) have been implemented to severely limit the damage caused by the breach. App owners can limit a user’s resources and actions based on the user’s role using SaaS user permissions. It is […]

Visual Studio Market becomes victim of supply chain attack

Aqua Security researchers discovered that hackers are conducting supply chain attacks using Visual Studio Marketplace. According to the report, attackers could impersonate popular VS Code extensions to hoodwink developers into downloading malicious versions. The attack vector aimed at the Visual Studio Code extensions marketplace could be used to upload rogue extensions masquerading as their legitimate […]

John Deere signs right to repair agreement

Farmers who use John Deere equipment will get a break beginning in 2023, thanks to an agreement reached between the company and the American Farm Bureau Federation that guarantees farmers and ranchers the right to repair their own farm equipment. Farmers’ access to diagnostic and repair codes, as well as operator, parts and service manuals […]

Kinsing malware exploiting misconfigured and exposed PostgreSQL servers

The Kinsing malware is now actively infringing Kubernetes clusters, according to Microsoft’s Defender, by utilizing known flaws in container images and malfunctioning, exposed PostgreSQL containers. “Recently, we identified a widespread campaign of Kinsing that targeted vulnerable versions of WebLogic servers,” reads a report by Microsoft security researcher Sunders Bruskin. “Attacks start with scanning of a […]

U.K. mandates new homes to be built with gigabit connectivity

The U.K. government has enacted new law to ensure that new homes are built with gigabit broadband connections and to allow telecoms companies to provide faster internet to people living in apartment buildings. According to revised Building Regulations 2010, new homes must now be constructed with gigabit fiber broadband connections. Meanwhile, the Telecommunications Infrastructure (Leasehold […]

Malicious PyPi packages found with AWS keys

Tom Forbes, a UK-based software developer, discovered 57 active API access keys for AWS services that can be exploited. They use keyloggers to steal sensitive user information stored in browsers, run shell commands, and steal typed secrets. Forbes created a Rust tool that checks the presence of AWS API keys in all new PyPI packages. […]

U.S. Supreme Court grants WhatsApp permission to pursue Pegasus spyware lawsuit

The United States Supreme Court has granted Meta permission to file a lawsuit accusing an Israeli company, NSO, for illegally accessing WhatsApp servers while installing a spyware known as Pegasus on users’ devices. This came after the Supreme Court rejected NSO Group Technologies’ appeal, which claimed immunity from the lawsuit because it was acting on […]

FTC proposes to abolish non-compete agreements

The Federal Trade Commission has proposed a rule that would effectively prohibit the use of non-compete agreements, leaving employers with fewer legal options for safeguarding their classified information. A non-compete clause is a contractual agreement between an employer and a worker that prohibits the worker from working for a competing employer or starting a competing […]

Apple intends to substitute Broadcom’s chip with in-house design chip

As part of its long-term strategy of producing its own silicon, Apple intends to substitute the iPhone Bluetooth/Wi-Fi IC currently supplied by Broadcom with its own in-house design by 2025. The chip that will replace the Broadcom solution is a Wi-Fi and Bluetooth combo chip that is used in a variety of devices such as […]