Skip to content

In the News

Featured

04/25/2024

5 ways Runtime Security cuts through exploding software complexity

Software complexity is exploding. Modern applications and application programming interfaces (APIs) comprise hundreds of repositories, frameworks, components, platforms, containers, services and connections. The rapidly increasing use of third-party, open-source libraries and AI-generated code is aggravating the challenge.

Read More
5 ways Runtime Security cuts through exploding software complexity

06/15/2023

Steve Wilson – OWASP Top Ten for LLMs

How do we do security in the world of AI and LLMs?

Read More arrow-right-tertiary

06/15/2023

Global cybersecurity agencies detail cyber threat from LockBit ransomware hackers

A joint cybersecurity advisory (CSA) has been released by global cybersecurity agencies.

Read More arrow-right-tertiary

06/14/2023

XSS Vulnerabilities Found in Microsoft Azure Cloud Services

Microsoft quickly issued patches for the two security issues, which could allow unauthorized access to cloud sessions.

Read More arrow-right-tertiary

06/14/2023

CISA: LockBit behind 1 in 6 ransomware attacks on US gov't in 2022

About one in every six ransomware attacks targeting U.S. government offices in 2022 can be traced back to a single group: LockBit.

Read More arrow-right-tertiary

06/14/2023

LockBit victims in the US alone paid over $90m in ransoms since 2020

As America, UK, Canada, Australia and friends share essential bible to detect and thwart infections.

Read More arrow-right-tertiary

06/14/2023

Wiz partners with Contrast Security to provide real-time insights into potential security risks

As a launch partner for the Wiz Integrations (WIN) platform, ContrastContrast Security brings the power of the Contrast Secure Code Platform to WIN.

Read More arrow-right-tertiary

06/09/2023

North Korea’s social engineering threat not going away

North Korean state-sponsored actors continue to use social engineering to target employees of think tanks, academic institutions and the news media.

Read More arrow-right-tertiary

06/09/2023

Bugs discovered in Honda sales platform. Update on Minecraft mod malware

Bugs discovered in Honda sales platform.

Read More arrow-right-tertiary

06/08/2023

The Gigabyte firmware backdoor: Lessons learned about supply chain security

Firmware attacks can pose a substantial risk to the software supply chain. 

Read More arrow-right-tertiary

06/01/2023

Potential Backdoor in Gigabyte PCs Exposes Supply Chain Risks

Cybersecurity firm Eclypsium has uncovered a potential backdoor in Gigabyte systems, raising concerns about the security of the technology supply chain.

Read More arrow-right-tertiary

06/01/2023

Apria Healthcare Data Breach Exposed Sensitive Information of Nearly 2 Million Patients

Apria healthcare data breach has exposed the personal, medical, and financial information of up to 1.8 million individuals.

Read More arrow-right-tertiary

05/31/2023

How audio deepfakes can trick employees into falling for a phish

They’re a “labor of love” requiring effort, but audio deepfakers have had success.

Read More arrow-right-tertiary

Experience Contrast today

Schedule a one-to-one demo to see what Contrast Runtime Security can do for you