<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>MTV Hustle &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/mtv-hustle/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 25 Jul 2020 08:14:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>MTV Hustle &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Organizations Continue to Struggle With App Vulns</title>
		<link>https://risk-academy.ru/organizations-continue-to-struggle-with-app-vulns/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 24 Jul 2020 22:09:56 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[application software]]></category>
		<category><![CDATA[individual applications]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[App]]></category>
		<category><![CDATA[Asia Pulp & Paper]]></category>
		<category><![CDATA[MTV Hustle]]></category>
		<category><![CDATA[Kidfit]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/organizations-continue-to-struggle-with-app-vulns/</guid>

					<description><![CDATA[A high percentage of discovered bugs remain unremediated for a long time, a new study shows. Chances are high that almost every single application an organization uses has at least [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article-main">
<header /><span class="strong black" style="font-size: 1.083333em">A high percentage of discovered bugs remain unremediated for a long time, a new study shows.</span></p>
<p class="" style="margin-top: 0">Chances are high that almost every single application an organization uses has at least one security vulnerability in it.</p>
<p>Contrast Security recently analyzed telemetry gathered between June 2019 and May 2020 from applications in development, testing, and operations at customer locations. The exercise found 96% of applications contained at least one security bug — more than one-quarter of them serious. Eleven percent of the applications analyzed had six or more serious vulnerabilities.</p>
<p>As usual, cross-site scripting errors, broken access control, and SQL injection errors topped the list of serious vulnerabilities that Contrast&#8217;s researchers encountered. More than seven in 10 (72%) had insecure configuration vulnerabilities and 64% were vulnerable to sensitive data exposure.</p>
<p>Contrast&#8217;s research shows attackers are relentlessly probing for these vulnerabilities to try and break into applications. The company counted over 13,000 attacks per month on average against individual applications — 98% of which were just probes that did not hit an existing vulnerability. Contrast counted a sharp&#8230;</p>
</div>
<p><a href="https://www.darkreading.com/vulnerabilities---threats/organizations-continue-to-struggle-with-app-vulns/d/d-id/1338457">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
