Top automation testing risks and how to avoid them
Over the last several years, QA test automation has become a trend in software development. Not surprisingly, as with its help, one can enhance testing processes starting from a simpleRead More →
Over the last several years, QA test automation has become a trend in software development. Not surprisingly, as with its help, one can enhance testing processes starting from a simpleRead More →
Cybersecurity specialists reported the finding of at least four vulnerabilities affecting Honeywell OPC UA Tunneller. According to the report, successful exploitation of these flaws would allow malicious hackers to accessRead More →
A recent security report details the detection of a new malware variant for Android devices deployed automatically via instant messaging platforms, mainly WhatsApp. According to Lukas Stefanko, author of theRead More →
Information security specialists reported that a group of threat actors has released an exploit to abuse a critical security flaw in SAP enterprise software. This exploit is capable of compromisingRead More →
SonicWall security team has issued a security alert related to a hacking group exploiting a zero-day flaw in its virtual private network (VPN) solutions that could allow the deployment ofRead More →
Alphabet Inc., through its cybersecurity subsidiary Jigsaw, announced the launch of Outline, a project that allows any user to create and run their own virtual private network (VPN) server toRead More →
Last Thursday the Goods and Service Tax Network (GSTN) posted a tweet mentioning that its security team detected “some activity in the cyberspace by unscrupulous elements”. According to the post,Read More →
During the last weeks the cybersecurity community has identified a new data breach outbreak related to the leaker known as ShinyHunters, who has been attacking multiple organizations worldwide. This time,Read More →
While it is obvious to mention that the threat actors behind the attack on SolarWinds have advanced knowledge, the cybersecurity community had not been able to specifically define its methodsRead More →
After a few convulsed weeks resulting from a highly controversial electoral process, Joe Biden has finally begun to serve as president of the United States and, although there are noRead More →