Insecure Deserialization Trend | March Attack Data | Contrast Security

Insecure Deserialization Trend | March Attack Data | Contrast Security

Cyberattackers are shifting their strategy in attacking applications and focusing on one of the most dangerous tactics. For the fourth straight month, the number one tactic was insecure deserialization, aka untrusted deserialization ...
Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits

Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits

Two highly respected technology analysts from different cybersecurity disciplines are coming together to recommend that companies consider Application Detection and Response. Organizations face a constant barrage of cyber threats, including zero-day vulnerabilities ...
Cybersecurity Insights with Contrast CISO David Lindner | 03/14/25

Cybersecurity Insights with Contrast CISO David Lindner | 03/14/25

Insight No. 1 — We are frogs, falling asleep in security-debt stew Companies are drowning in high-risk software security debt, with critical vulnerabilities festering for an average of 252 days before they’re ...
Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats

Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats

Key Takeaways During the period covered by the Black Basta leaked chat logs (18 September 2023 – 28 September 2024), […] ...
Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Have you silenced WAF alerts in your SIEM or just stopped sending them altogether? You're not alone. Many SOCs find themselves overwhelmed by the sheer volume of noise generated by traditional WAFs, ...
Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

 For over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA compliance — checking regulatory boxes rather than securing critical systems. We told them that ...
RansomHub Affiliate leverages Python-based backdoor

RansomHub Affiliate leverages Python-based backdoor

In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor […] ...
Unsafe Deserialization Attacks Surge | December Attack Data | Contrast Security

Unsafe Deserialization Attacks Surge | December Attack Data | Contrast Security

Attacks on individual applications were down month to month in December 2024, but one of the most dangerous types of attacks was up significantly. That’s according to data Contrast Security publishes monthly ...

2024 Firefox Vulnerabilities: Managing Security Risks 

The preferred browser of more than 3% of all internet users, Mozilla Firefox is well-regarded for its perceived ability to deliver a secure and privacy-focused web experience. However, that same widespread usage ...
Fake Solana packages target crypto devs, abuse Slack & ImgBB for data theft

Fake Solana packages target crypto devs, abuse Slack & ImgBB for data theft

Recently discovered malicious packages on the npmjs.com registry named "solanacore," "solana-login," and "walletcore-gen" target Solana crypto developers with Windows trojans and malware capable of keylogging and sensitive data exfiltration. Furthermore, these packages ...