Grindr, the world's largest social networking app for Gay, Bi, Trans, and Queer people, contained a serious flaw in the authentication mechanism for users that allowed cyber criminals to change the passwords of Grindr users at will.
Stephane Konarkowski, Senior Security Consultant at Outpost24
Navigating the murky world of modern web applications can be a minefield from a cybersecurity standpoint. Many of these critical applications contain a labyrinth of layers, and if not designed with security in mind, they can be a breeding ground for vulnerabilities.
Container inspection helps DevOps automate checks for security vulnerabilities in Docker registries at scale before deployment to ensure safer and faster release in the SDLC.
Stephane Konarkowski, Senior Security Consultant at Outpost24
Complex is a term that is often used to describe the technological make up of modern web applications. They are like onions, made up of intricate layers where, if not designed or secured appropriately, can foster many critical vulnerabilities. Therefore, it’s necessary for organisations to know the key attack vectors and system entry points used by the modern hacker to better understand their overall attack surface, writes Stephane Konarkowski, Senior Security Consultant at the cyber security and vulnerability assessment firm Outpost24.
Hugo van der Toorn, manager offensive security at Outpost24
Clothing retailer Monsoon Accessorize has been using VPN servers that have critical vulnerabilities, putting it at risk of hacking or ransomware attack, according to an analysis by VPNpro.