Obtaining a good overview of all known vulnerabilities for software products is often more difficult and complex than one might initially assume....
VULNERABILITIES
read more
From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings
In the dynamic field of cybersecurity, it is often the obscure and long-forgotten vulnerabilities that pose a hidden threat to otherwise hardened...
The Surprising Complexity of Finding Known Vulnerabilities
IT security professionals need an efficient and reliable solution for identifying known vulnerabilities in a software product, given its name and...
The top 10 cloud security fails and how to avoid them: usd AG gives presentation at CloudLand 2023
From June 20 until June 23, 2023, the second edition of the German-speaking "CloudLand“ festival of the German-speaking Cloud Native Community...