Tag: Backend
-
How to use Logpoint pySigma Backend for threat detection
There’s no doubt that open-source projects are immense contributors to the software ecosystem. With an extensive and active community of …
-
How Tracking Backend Activity Improves WordPress Security
Website security is among the biggest challenges that web professionals face. It’s a constant battle to thwart malicious …
-
Razer Data Breach: Alleged Database and Backend Access Sold for $100k
The hacker claims to have stolen Razer’s data, which allegedly includes source code, encryption keys, database access logins, and backend …
-
Secure the Web with an API-Driven Backend for Frontend
Building and securing browser-based apps has always been a challenge. Development is much easier these days, with far better technical …
-
How to Integrate EDI With Your Backend Systems
EDI powers the supply chain, providing trading partners a central, standardized method to securely exchange core business documents, such …
-
A Technologist’s Perspective: Blockchain Beyond the Hype
There’s a lot of speculative investment around blockchain space but not a lot of real use. This will change when reality kicks in and new …
-
Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms
Two 11-year-old budding hackers last week at DEF CON in Las Vegas used SQL injection attack code to break into a replica of the Florida …
-
Stitch Sews Together Third-Party Backend Services for MongoDB
MongoDB World 2017 kicked off in Chicago on Tuesday with the unveiling of Stitch, a new service integration software package for the popular open source MongoDB document database. Stitch is designed to handle routine tasks, such as setting up access control and security rules and can also be used to seamlessly integrate with third-party services for things…
-
HospitalGown Vulnerability Exposes Apps to Backend Server Risk
Security vendor Appthority released new research on May 31 detailing a vulnerability it calls ‘HospitalGown’ which is exposing over 1,000 mobile applications to backend server risks. The vulnerability involves improperly configured backend servers, running unsecured Elasticsearch and MySQL data stores. Appthority’s analysis found 43 Terabytes of exposed data due to HospitalGown, running across over 21,000 open…
-
Enterprise Mobile Apps Expose Sensitive Data via Backend Systems
Many of the applications installed on enterprise mobile devices expose potentially sensitive data by failing to properly secure the connection between the app and backend servers, enterprise mobile security firm Appthority warned in a report published on Wednesday. Read full news article on SecurityWeek
●●●