Skip to content

In the News

Featured

08/30/2022

State of Application Security – Jeff Williams, Contrast Security

Alan and Jeff discuss the current state and trends of application security as well as the latest news from Contrast Security.

Read More
State of Application Security – Jeff Williams, Contrast Security

09/23/2022

Cyberattackers Compromise Microsoft Exchange Servers via Malicious OAuth Apps

Cybercriminals took control of enterprise Exchange Servers to spread large amounts of spam aimed at signing people up for bogus subscriptions.

Read More arrow-right-tertiary

09/22/2022

Malicious OAuth applications used to compromise Microsoft Exchange servers

Microsoft Corp. researchers today detailed a recent attack involving malicious OAuth applications that were deployed on compromised cloud tenants to control Exchange servers and spread spam.

Read More arrow-right-tertiary

09/21/2022

Hackers steal over $160 million from crypto market maker Wintermute

Cryptocurrency market maker Wintermute was breached in the early hours of Sept. 20

Read More arrow-right-tertiary

09/17/2022

Serious breach at Uber spotlights hacker social deception

The ride-hailing service Uber said Friday.

Read More arrow-right-tertiary

09/16/2022

Factbox: What to do if you were a corporate hack victim

A reported breach of Uber Technologies Inc's (UBER.N)

Read More arrow-right-tertiary

09/16/2022

Uber investigating security breach of several internal systems

Communications and engineering systems were taken offline after hacker sends images of repositories to cybersecurity researchers and The New York Times.

Read More arrow-right-tertiary

09/16/2022

Industry Reactions to Govt Requiring Security Guarantees From Software Vendors

The White House has announced new guidance with the aim of ensuring that federal agencies only use secure software.

Read More arrow-right-tertiary

09/15/2022

White House issues a memorandum on software supply chain security

The White House yesterday issued guidance for Federal agencies’ use of software security practices. 

Read More arrow-right-tertiary

09/15/2022

White House: U.S. agencies have 90 days to create inventory of all software

he White House released new guidance this week ordering federal agencies to create a full inventory of the software they use within 90 days. 

Read More arrow-right-tertiary

09/15/2022

3 Key Resume Tips for iOS Developers Seeking a Job

Submitting a resume is often a nerve-wracking experience. 

Read More arrow-right-tertiary

09/15/2022

White House issues a memorandum on software supply chain security.

The White House yesterday issued guidance for Federal agencies’ use of software security practices. 

Read More arrow-right-tertiary

09/15/2022

Former Conti Ransomware Members, Tools Linked To Initial Access Broker Targeting Ukraine

Five attack campaigns conducted against Ukrainian government agencies and businesses.

Read More arrow-right-tertiary

Experience Contrast today

See how you could get secure code moving on the Contrast Secure Code Platform