Threat
Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global
I had the great delight of reading Geoff White’s new book, “Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global”, I thoroughly recommend it. The book is superbly researched ...
API Security Need-to-Know: Ramifications of Weak API Authentication
In today’s blog, we will discuss the ramifications of unauthenticated APIs using the recently published ZIPNet vulnerability. ZIPNet is an online application operated by Law Enforcement Authorities in India to share Crime ...
Assessing API Security Risks, Plotting a Solution
Application programming interfaces (APIs) are increasingly opening paths to vulnerabilities further down in application architectures. But legacy security testing approaches and firewalls are an inefficient and ineffective approach to securing APIs, as ...
Security in Kubernetes Environment
The post Security in Kubernetes Environment appeared first on CCSI ...
Security Threats Facing Modern Mobile Apps
We use mobile apps every day from a number of different developers, but do we ever stop to think about how much thought and effort went into the security of these apps?It ...
Contrast Labs: Mapping Risk Profiles for Select OWASP Top 10 Vulnerabilities to Understand Their AppSec Risk
At Contrast Security, the Contrast Labs team is charged with numerous things. Part of this charter includes looking at threat intelligence and understanding the true threat landscape. This encompasses risks that different ...
Public WiFi is actually still pretty dangerous
I wanted to write a short response to an article EFF posted, Why Public Wi-Fi is a Lot Safer Than You Think. It's no secret transport layer security has vastly improved over ...
Huawei set for limited UK 5G role, but can we Trust Huawei?
Today the UK Government decided Huawei can be allowed to help build the UK's 5G network, but remain banned from supplying kit to "sensitive parts" of the core network. The Prime Minister ...
DECEMBER 2019 AppSec Intelligence Report
This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from December 2019. By providing continuous insight and detection from inside applications, Contrast can identify and trend the ...
November 2019 AppSec Intelligence Report
This report summarizes Contrast Labs' analysis of real world application attack and vulnerability data from November 2019. It builds on data that Contrast Security observed over the previous months and highlights to ...
