This Python Sample Code demonstrates how to create a log inspection rule that monitors a log file for errors, adds directories, and creates a malware scan configuration to exclude a directory list from scans.
Last week, a remote code execution vulnerability was discovered in Drupal's core code. After uncovering and starting its mitigation efforts, Drupal reported mass exploits in the wild. The company published fixes in the most recent versions and suggests that developers upgrade to the latest version.
GateHub recently reported that around 100 XRP wallets were hacked. Over 23 million Ripple coins were directed to multiple exchanges where the hacker was able to presumably use the coins. GateHub has published remediation instructions and understands that the hack started with a valid API token.
Earlier this month, hacker Alexey V. Borodin discovered a method that allows some iOS app users to make "In-App Purchases" for FREE. Because Apple does not link purchases directly to individual customers or devices, a single receipt can be used for multiple transactions. Borodin's method takes advantage of this fact by fooling iOS apps into accepting fake purchase receipts and bypassing Apple’s authentication servers.