Application Vulnerability
Over the preceding two months, malevolent actors have exploited a vulnerability in the HTTP/2 web communication protocol, rendering web application servers, load balancers, and web proxies susceptible to distributed denial-of-service (DDoS) attacks of an unprecedented magnitude. Major cloud infrastructure providers like Google, AWS, and Cloudflare, as well as web server vendors, have been collaborating on...
Read More
PowerShell Gallery
The PowerShell Gallery, a central repository maintained by Microsoft for sharing and acquiring PowerShell code, has recently faced heightened scrutiny due to a series of active vulnerabilities that pose a significant risk of supply chain attacks against its users. These flaws, uncovered by security researchers from Aqua, have shed light on potential weaknesses in the...
Read More