<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISA and FBI release secure by design alert on cross-site scripting in Threats</title>
    <link>https://community.isc2.org/t5/Threats/CISA-and-FBI-release-secure-by-design-alert-on-cross-site/m-p/75146#M1424</link>
    <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Nov 2024 06:06:38 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2024-11-15T06:06:38Z</dc:date>
    <item>
      <title>CISA and FBI release secure by design alert on cross-site scripting</title>
      <link>https://community.isc2.org/t5/Threats/CISA-and-FBI-release-secure-by-design-alert-on-cross-site/m-p/74844#M1413</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CISA and the FBI are increasingly focusing on proactive cybersecurity and &lt;A href="https://www.ibm.com/topics/cyber-resilience" target="_blank"&gt;cyber resilience&lt;/A&gt; measures. Conjointly, the agencies recently released a new &lt;A href="https://www.cisa.gov/resources-tools/resources/secure-design-alert-eliminating-cross-site-scripting-vulnerabilities" target="_blank" rel="noopener nofollow"&gt;Secure by Design alert&lt;/A&gt; aimed at eliminating &lt;A href="https://www.ibm.com/docs/en/sva/10.0.7?topic=configuration-prevention-vulnerability-caused-by-cross-site-scripting" target="_blank"&gt;cross-site Scripting (XSS) vulnerabilities&lt;/A&gt;, which have long been exploited to compromise both data and user trust.&lt;/P&gt;&lt;P&gt;Cross-site scripting vulnerabilities occur when a web application improperly handles user input, allowing attackers to inject malicious scripts into web pages that are then executed by unsuspecting users. These vulnerabilities are dangerous because they don’t attack the application itself but exploit user trust in a legitimate website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/news/cisa-fbi-release-secure-by-design-on-cross-site-scripting/" target="_blank"&gt;https://securityintelligence.com/news/cisa-fbi-release-secure-by-design-on-cross-site-scripting/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 19:36:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CISA-and-FBI-release-secure-by-design-alert-on-cross-site/m-p/74844#M1413</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-10-31T19:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: CISA and FBI release secure by design alert on cross-site scripting</title>
      <link>https://community.isc2.org/t5/Threats/CISA-and-FBI-release-secure-by-design-alert-on-cross-site/m-p/75146#M1424</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 06:06:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CISA-and-FBI-release-secure-by-design-alert-on-cross-site/m-p/75146#M1424</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-11-15T06:06:38Z</dc:date>
    </item>
  </channel>
</rss>

