+44 (0)203 88 020 88

Menu

Search

web applications

Critical vulnerability patched in Jira

Atlassian has released new versions of Jira Server and Jira Data Centre that address a critical vulnerability which has lived in the code for almost 8 years. The vulnerability, CVE-2019-11581 is a server-side template injection vulnerability. According to the security advisory from Atlassian: There was a server-side template injection vulnerability in Jira Server and Data Center, […]

Critical vulnerability patched in Jira Read More »

What are software supply chain attacks?

Software Supply chain attacks – do you know what you are importing? Many websites and applications routinely import additional code modules from external repositories.  These could be javascript libraries for a webpage or source code for an application. Two recent incidents illustrate the risks of supply chain attacks against the code of your applications and

What are software supply chain attacks? Read More »

Extensive DNS hijack attacks prompt urgent action

A wave of DNS hijack attacks has been sweeping across Europe, the Middle-East and America according to recently published reports from FireEye and Cisco.  While the attacks are creative and sophisticated, the root attack vector is often a simple credential compromise to the DNS control panel of an organisation’s domain name registrar.  The scale of

Extensive DNS hijack attacks prompt urgent action Read More »

safe and secure browser cookies

How to make the perfect cookies

Browser cookies play an important role in nearly all modern websites and applications. From tracking user-interaction through services like Google Analytics, through to maintaining the state of customer shopping carts in eCommerce applications. Cookies can also contain session tokens for web applications to ensure that user sessions are maintained between browser page refreshes. Although security

How to make the perfect cookies Read More »

0

No products in the basket.

No products in the basket.