How to steal a million (of your data)

By GIXnews

Any user data — from passwords for entertainment services to electronic copies of documents — is highly prized by intruders. The reason is simply that almost any information can be monetized. For instance, stolen data…

Guide to top security certifications

By GIXnews

Cyberattacks against enterprise networks are on the rise, and the bad guys, from solo actors all the way up to nation states, show no signs of easing up anytime soon. As the cost of a…

Introducing AI-Driven Social Media Dashboard

By GIXnews

AI-Driven Social Media Dashboard is a solution that monitors and ingests specified tweets using stream processing and leverages a serverless architecture and machine learning services to translate and extract insights from those tweets. The solution…

Jenkins Stapler Web Framework Bypass Vulnerability

By GIXnews

A vulnerability in the Jenkins Stapler Web Framework could allow an authenticated, remote attacker to access sensitive information on a targeted system. The vulnerability is due to improper security restrictions when accessing view fragments by…