article thumbnail

CVE-2024-34716: Critical Security Vulnerability Uncovered in PrestaShop

Penetration Testing

The PrestaShop project, a leading open-source e-commerce platform powering over 300,000 web stores globally since 2007, has recently issued a security advisory revealing two significant vulnerabilities.

article thumbnail

OWASP Names a New Top Vulnerability for First Time in Years

eSecurity Planet

OWASP security researchers have updated the organization’s list of the ten most dangerous vulnerabilities – and the list has a new number one threat for the first time since 2007. Access control issues are often discovered when performing penetration tests. They can even deface the entire site in some cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Developed by the SANS Institute in 2007, SIFT works on 64-bit OS, automatically updates the software with the latest forensic tools and techniques, and is a memory optimizer. The first version of Volatility was launched at Black Hat and DefCon in 2007 and based its services around academic research into advanced memory analysis and forensics.

Software 139
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Exabeam UEBA 2021 Private Cato Networks SASE 2020 Private Confluera Cloud XDR 2019 Private Aqua Container security 2017 Private Netskope SASE 2017 Private Zscaler Zero trust 2012 Nasdaq: ZS Sailpoint Identity management 2007 Private. New Enterprise Associates (NEA). NightDragon. Tiger Global Management. YL Ventures.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Founded in 2007, Guardtime is a network security company that specializes in deploying distributed, virtualized machines built to execute tasks with cryptographic proofs of correctness. KSI Innovator: Estonia’s Guardtime. KSI was designed specifically to help the Estonian government implement a validated proof of operations.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1998-2007 — Max Butler — Max Butler hacks U.S. In 2007, he is arrested and eventually pleads guilty to wire fraud, stealing millions of credit card numbers and around $86 million of fraudulent purchases. 1999 — NASA and Defense Department Hack — Jonathan James, 15, manages to penetrate U.S. east coast.

article thumbnail

SW Labs | Review: ImmuniWeb Discovery

SC Magazine

An application penetration tester by trade, Ilia Kolochenko founded his first cybersecurity consulting firm named High-Tech Bridge in 2007. Later, he saw an opportunity to build a product focused on automating large portions of the penetration test. From this screen it is possible to add tags and add additional assets.