Cisco has patched a critical vulnerability in the REST API of Cisco's Elastic Services Controller that could lead to an attacker bypassing authentication on the REST API.
Security researchers from Imperva have found thousands of Docker hosts exposed to a new vulnerability and exposed remote Docker API. The new research describes the threat along with sample scripts and what can be done about it.
Researchers at Trend Micro have recently spotted malicious activity abusing systems running misconfigured Docker containers.
Google has patched a reCAPTCHA security vulnerability that allows an attacker to bypass a system.
Security firm Trustlook has found at least 25,936 malicious apps using one of Facebook’s APIs, such as a login API or messaging API. Such malicious apps could then use and abuse a range of Facebook login profiles, such as name, location and email address, according to recent blog post.
Appthority has discovered a significant data exposure vulnerability called Eavesdropper that impacts nearly 700 enterprise apps associated with 85 Twilio developer accounts.
A new attack that uses Docker containers to hide, persist and plant malware was demonstrated at Black Hat by a team of security researchers from Aqua Security.
In this article, we highlight some key points from the CSA report, to include guidelines on how to better secure communications, applications and APIs to enhance security of IoT products.