Software Security
KubeCon 2023: Securing Software Delivery and Deployment
At KubeCon 2023, Mitch Ashley talks with Gopal Dommety and David Green from OpsMX about securing software delivery and deployment ...
Critical Veeam ONE Vulnerabilities Addressed
Veeam has recently released essential updates to address four security vulnerabilities in its Veeam ONE monitoring and analytics platform. Two of them are critical, and it is crucial to apply these fixes ...
Progress Hotfixes: Rapid Action Against Vulnerabilities
Progress Software has acted quickly to strengthen the security of its software offerings by issuing a number of hotfixes. These Progress hotfixes are intended to address a severe security hole as well ...
Nagios XI Network Monitoring Software Flaws Exposed
A number of Nagios XI network monitoring software flaws have recently been discovered. These flaws have the potential to result in privilege escalation and data disclosure. Nagios XI is a popular monitoring ...
The IoT Impact On Automotive Security And How To Solve The Challenge With Ravishankar Chamarajnagar, CPO At AppViewX
Welcome to our insightful blog featuring an in-depth conversation with Ravishankar (Ravi) Chamarajnagar, Chief Product Officer (CPO) of AppViewX, as we delve into the realm of the Internet of Things (IoT). Our ...
How to Strengthen Cybersecurity in the Age of AI
To get ahead of the adversaries in this new AI age, cybersecurity research into new generative AI attacks and defenses must be further along ...
Checkmarx Details Potential Threats to AWS S3 Buckets
Checkmarx disclosed how cybercriminals can hijack S3 storage bucket binaries on the AWS cloud by replacing binaries with malicious ones ...
Enhance Your Cybersecurity With An SBOM
With all the cybersecurity benefits an SBOM offers, it’s a wonder they weren’t used in the software development life cycle long ago. Today, the need for SBOMs has grown more urgent because ...
SBOMs’ Role in Open Source Security
When the Cybersecurity and Infrastructure Security Agency (CISA) announced its guidelines to promote better security of the software supply chain, the agency touted the software bill of materials (SBOM) as “a key ...
Lazarus Assault Via 3CX Exposes Need to Rethink Security
When North Korean threat actors the Lazarus Group exploited a legitimate update to the 3CXDesktopApp—a softphone application from 3CX—security professionals didn’t initially pick up on the import of the activity and tactics ...