Introducing “Attacker Reachability”: Reduce open-source vulnerability tickets by 90% or more.

Introducing “Attacker Reachability”: Reduce open-source vulnerability tickets by 90% or more.

Introducing “Attacker Reachability”: Reducing open-source vulnerability tickets by 90% or more.Tl;dr; ShiftLeft is announcing Intelligent SCA that uses a four-step process to prioritize vulnerabilities that matter. ShiftLeft Intelligent SCA introduces the concept of ...

4 Strategies to Mitigate Pass-the-Cookie Attacks

Another year, another new set of cybersecurity threats to overcome, outwit and mitigate against. At the beginning of 2021, the cybersecurity world was informed by CISA (the USA Cybersecurity and Infrastructure Security ...
Vulnerable Microsoft Exchange servers leave thousands of organizations compromised

Vulnerable Microsoft Exchange servers leave thousands of organizations compromised

This week it was reported that tens of thousands of organizations around the world were compromised using several Microsoft Exchange 0-days. Since then attackers have been busy targeting the compromised organizations in ...

Tripwire Patch Priority Index for February 2021

Tripwire’s February 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Apache, VWware and Microsoft. First on the patch priority list this month is a patch for Apache Tomcat. The Apache ...

What’s Different About Data Security in the Cloud? Almost Everything.

Well before the onset of the pandemic most organizations had a digital transformation plan in place which included migrating workloads to new modern architectures, usually a private, public, or hybrid cloud. As ...
Why are Employees Most Vulnerable to Cyber Attacks?

Why are Employees Most Vulnerable to Cyber Attacks?

With the rapid development in technology and ever-increasing internet users, cyber security plays a critical role in every industry. SecuringContinue reading The post Why are Employees Most Vulnerable to Cyber Attacks? appeared ...
RDPalooza: RDPs in the World of Cybercrime

RDPalooza: RDPs in the World of Cybercrime

  Key Points  Remote Desktop Protocol (RDP) is a built-in part of the Windows toolkit popular for facilitating remote work. Cybercriminals take interest in compromising RDP endpoints as they provide direct access ...
iPhone Zero-Click Exploit, BEC Email Auto-Forward Scams, COVID-19 Vaccine Cold Chain Attacks

iPhone Zero-Click Exploit, BEC Email Auto-Forward Scams, COVID-19 Vaccine Cold Chain Attacks

In episode 150 for December 7th 2020: Details about a now patched iPhone zero-click Wi-Fi exploit, the FBI warns of business email compromise scammers using email auto-forwarding in attacks, and how nation-state ...
Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug

Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug

In episode 149 for November 30th 2020: Police begin to pilot a program to live-stream Amazon Ring cameras, new details about Amazon Sidewalk, Congress unanimously passes a federal Internet of Things security ...
Visualizing program structure characteristics for 12 million lines of code

Visualizing program structure characteristics for 12 million lines of code

Static code analyzers can detect security vulnerabilities. They also provide an unusual perspective on the structure of the code they analyze. This perspective offers a glimpse inside the internals of programs that ...