logo

Jedar for Digital Rights

CISA Flags Twilio Authy and Internet Explorer Vulnerabilities: What You Need to Know

The Cybersecurity and Infrastructure Security Agency (CISA) has recently added two significant new vulnerabilities to its catalog of exploited vulnerabilities: flaws affecting Twilio’s Authy authentication app and Internet Explorer (IE). This development underscores the critical importance of maintaining vigilance in the face of evolving digital threats. Understanding the Vulnerabilities Twilio Authy: Twilio Authy is a […]

Unveiling Vigorish Viper: The Technology Behind China’s Cybercriminal Syndicate

Recent investigations by cybersecurity experts have exposed a sophisticated Chinese cybercrime network known as “Vigorish Viper,” which orchestrates gambling operations and human trafficking activities across Southeast Asia. This organized crime syndicate leverages a comprehensive technological suite to seamlessly manage its illicit dealings, from initiating to executing cybercrime ventures. Infoblox, a leading network security company, has […]

CVE-2024-38164: Understanding the GroupMe Privilege Escalation Vulnerability

In the ever-evolving landscape of digital communication, security vulnerabilities emerge that can jeopardize user safety and data privacy. Recently, a significant flaw identified as CVE-2024-38164 has come to light within the widely-used messaging platform GroupMe. What is CVE-2024-38164? CVE, or Common Vulnerabilities and Exposures, is a system that provides a reference-method for publicly known information-security […]

Understanding CVE-2024-41668: The Threat of Server Side Request Forgery in CBioPortal

Published on: October 12, 2023 What is CVE-2024-41668? CVE-2024-41668 is a newly discovered cybersecurity vulnerability classified as a Server Side Request Forgery (SSRF) within the CBioPortal application. This vulnerability can potentially expose sensitive information and manipulate server-side requests, posing significant risks to users and sensitive data. Breaking Down Server Side Request Forgery (SSRF) Before we […]