27th Aug 2020

PCI compliance and web application firewalls

Since its formation, PCI DSS has gone through several iterations in order to keep up with changes to the online threat landscape. While the basic rules for compliance have remained constant, new requirements are periodically added. One of the more significant of these additions was Requirement 6.6, introduced in 2008. It was established to secure ...

31st Jul 2020

Bug in widely used bootloader opens Windows, Linux devices to persistent compromise

A vulnerability (CVE-2020-10713) in the widely used GRUB2 bootloader opens most Linux and Windows systems in use today to persistent compromise. The list of affected systems includes servers and workstations, laptops and desktops, and possibly a large number of Linux-based OT and IoT systems.What’s more, the discovery of this vulnerability has ...

1st Mar 2020

Tomcat critical vulnerability named Ghostcat was found earlier to affect major tomcat versions

A critical vulnerability named Ghostcat was recently discovered in Apache Tomcat Servers. Apache Tomcat is a software used to deploy Java Servlets and JSPs. This vulnerability resides in Tomcat for more than a decade now. Ghostcat, tracked as CVE-2020-1938, was discovered in Tomcat AJP protocol by researchers at Chaitin Tech. Tomcat ...