Security flaws in an SSO plugin for Caddy

By Maciej Domanski, Travis Peters, and David Pokora We identified 10 security vulnerabilities within the caddy-security plugin for the Caddy web server that could enable a variety of high-severity attacks in web applications, including client-side code execution, OAuth replay attacks, and unauthorized access to resources. During our evaluation, Caddy was deployed as a reverse proxy […]

September 18, 2023
Read More >>

Connected cars and cybercrime: A primer

Original equipment suppliers (OEMs) and their suppliers who are weighing how to invest their budgets might be inclined to slow pedal investment in addressing cyberthreats. To date, the attacks that they have encountered have remained relatively unsophi…

September 5, 2023
Read More >>

Ransomware attacks go beyond just data

65% of organizations confirmed that ransomware is one of the top three threats to their viability, and for 13%, it is the biggest threat, according to a report by Enterprise Strategy Group (ESG) and Keepit. Organizations’ strategies against ranso…

September 4, 2023
Read More >>

Secure Your Business Systems: Top Tips for Protection

Business systems are the backbone of any successful company. They allow for efficient operations, streamlined communication, and effective management. However, with the increasing reliance on technology, the need for strong cybersecurity measures has become more important than ever. In today’s world, cyber threats are not a matter of if, but when. Therefore, it is crucial […]

The post Secure Your Business Systems: Top Tips for Protection appeared first on CyberDB.

September 1, 2023
Read More >>