ZAPESCAPE: Organization-wide control over Code by Zapier Permalink
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the tec...
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Zenity research team discovers a vulnerability in Zapier’s storage solution that exposes sensitive customer data. Despite Zapier’s efforts to mitigate the is...