© 2021 Digital Ecosystem Authority All rights reserved.
At the beginning of December, the Apache Software Foundation dropped a bombshell when it disclosed a zero-day vulnerability in popular Java logging package Log4j. With
There’s a spot on the garage floor right underneath your parked car’s engine… and it’s growing. Your car has a leak—but what is it? Oil?
Bad actors are unceasingly on the hunt for vulnerabilities on websites and apps. The right tools and processes for managing third-party domains can help thwart
Access to Information, The Media Trust, and Duke University: September Update Ransomware has become a top cybersecurity risk in recent years and it shows no signs of
Philip Agre, a computer scientist turned humanities professor, was prescient about many of the ways technology would impact the world predicting the dark side of
This is a transcript from The Debugger podcast of Bob Sullivan found on The Red Tape Chronicles Apple’s ad is an all-too-real demonstration I like
At the beginning of this year, Google announced that by 2022, the Chrome web browser will drop support for third-party tracking cookies, which – until now –
In a previous article, we explored the security risks that third-party code can bring to your website. In short, otherwise useful third-party libraries may contain malicious
Background Since beginning data collection in July, this research project has been interested in the types of undesired third-party code that attempt to interact with