Google Addresses Latest Zero-Day Affecting Chrome

Google Addresses Latest Zero-Day Affecting Chrome

Yesterday, Google addressed another 0-day vulnerability affecting Google Chrome. The post Google Addresses Latest Zero-Day Affecting Chrome appeared first on Flashpoint ...

The Cyber Resilience Imperative for Software Supply Chain Security

The concepts of cyber resilience and software supply chain security go hand in hand. It’s heartening that many organizations now recognize the cybersecurity landscape continues to evolve and grow more sophisticated and ...
vulnerability, management, JFrog OMI security vulnerability data breach

Attack Surface Management Vs. Vulnerability Management

Cybersecurity is full of acronyms. So many, in fact, that I would be hard-pressed to find someone who knows what they all stand for or clearly explain the subtle differences between many ...
Security Boulevard

Rezilion Releases New Smart Fix Capability, Delivering Intelligent Guidance for Patching

NEW YORK, May 31, 2023 – Rezilion, an automated software supply chain security platform, today announced the release of its new Smart Fix feature in the Rezilion platform, which offers critical guidance ...
Introducing Smart Fix By Rezilion

Introducing Smart Fix By Rezilion

As a part of our mission to improve and accelerate software supply chain security, today we are pleased to unveil Rezilion’s new Smart Fix feature. Vulnerabilities can pose significant risks to organizations, ...

The Conflict Between Operational Risk and Security Risk

Let’s talk about operational risk and security risk. In the dynamic world of software development, a persistent tension exists between developers and security professionals when it comes to managing operational risk and ...
security Palo Alto Networks OT endpoint, attacks, security

The Security Maturity Improvement Imperative

To enhance corporate protection against the aggressive stream of cyberattacks impacting organizations today, it is imperative to actively manage, monitor and cover systems, software and data with well-tuned security toolsets. According to ...
Security Boulevard

How Software Supply Chain Vulnerabilities Lead to Attacks

By Esther Shein Software supply chain attacks are increasingly gaining attention. Why? Software developers today have grown increasingly reliant on vendors, suppliers, and partners, so the software supply chain has become a ...
Critical PaperCut Vulnerability CVE-2023-27350 Exploited by Threat Actors

Critical PaperCut Vulnerability CVE-2023-27350 Exploited by Threat Actors

In this blog post, we detail PaperCut Vulnerability CVE-2023-27350. On March 8th, PaperCut released new versions that contained security updates and addressed two recently discovered CVEs – CVE-2023-27351 and CVE-2023-27350. Today, we ...
Risk Intelligence Index: The April 2023 Cyber Threat Landscape

Risk Intelligence Index: The April 2023 Cyber Threat Landscape

Flashpoint’s monthly look at the cyber risk ecosystem affecting organizations including ransomware, vulnerabilities, and insider threats. The post Risk Intelligence Index: The April 2023 Cyber Threat Landscape appeared first on Flashpoint ...