Crunching Some Numbers on PHP Support

PHP Extended Lifecycle Support (ELS) allows you to continue using older versions of PHP while still receiving security updates for the language, without introducing breaking changes to your application. The first and ...

Google Chrome DBSC Protection Tested Against Cookie Attacks

In light of cookie stealing attacks and to ensure Chrome browser protection, Google has recently piloted its new Chrome DBSC. The device-bound session credentials (DBSC) are aimed at protecting users against cookie ...
What is SOC 2 Compliance Audit?

What is SOC 2 Compliance Audit?

Our digital world is based on connectivity, but with that comes great responsibility. Businesses manage vast amounts of client information. Ensuring the protection of this information is not an easy task, especially ...
Cortex EDR Research Shmuel Cohen

The Dark Side of EDR: Repurpose EDR as an Offensive Tool

|
See how a SafeBreach Labs researcher bypassed the anti-tampering mechanism of a leading EDR to execute malicious code within one of the EDR's own processes and altered the mechanism to gain unique, ...
NTA Email Alert Configuration

NTA Email Alert Configuration

| | DDoS attack, knowledge base, NTA
There are two separate email configurations on NTA which do not affect each other. One is the region/IP group email alert, the other is the global email alert. 1.  Region/IP Group Email ...
Small Business Innovation Research Program

The Ultimate Guide to SBIR and STTR Program Budgeting

| | security
The world advances based on innovation, and innovation can come from anywhere. The trouble is that the current capitalist economic system encourages large corporations to play conservatively with their products and their ...
Companies Didn’t Prioritize Third-Party Sources of CVEs, Here’s What Happened

Companies Didn’t Prioritize Third-Party Sources of CVEs, Here’s What Happened

| | security
Last December, Veracode reported that more than a third of Java applications still use vulnerable versions of the Log4j Java logging library. This after many engineering teams dropped their regular work and spent ...

What Makes Containers Vulnerable?

|
Read this quick guide to the types of vulnerabilities that affect containers. The post What Makes Containers Vulnerable? appeared first on Mend ...