In the News
Featured
04/25/2024
5 ways Runtime Security cuts through exploding software complexity
Software complexity is exploding. Modern applications and application programming interfaces (APIs) comprise hundreds of repositories, frameworks, components, platforms, containers, services and connections. The rapidly increasing use of third-party, open-source libraries and AI-generated code is aggravating the challenge.
06/15/2023
Steve Wilson – OWASP Top Ten for LLMs
How do we do security in the world of AI and LLMs?
06/15/2023
Global cybersecurity agencies detail cyber threat from LockBit ransomware hackers
A joint cybersecurity advisory (CSA) has been released by global cybersecurity agencies.
06/14/2023
XSS Vulnerabilities Found in Microsoft Azure Cloud Services
Microsoft quickly issued patches for the two security issues, which could allow unauthorized access to cloud sessions.
06/14/2023
CISA: LockBit behind 1 in 6 ransomware attacks on US gov't in 2022
About one in every six ransomware attacks targeting U.S. government offices in 2022 can be traced back to a single group: LockBit.
06/14/2023
LockBit victims in the US alone paid over $90m in ransoms since 2020
As America, UK, Canada, Australia and friends share essential bible to detect and thwart infections.
06/09/2023
North Korea’s social engineering threat not going away
North Korean state-sponsored actors continue to use social engineering to target employees of think tanks, academic institutions and the news media.
06/09/2023
Bugs discovered in Honda sales platform. Update on Minecraft mod malware
Bugs discovered in Honda sales platform.
06/08/2023
The Gigabyte firmware backdoor: Lessons learned about supply chain security
Firmware attacks can pose a substantial risk to the software supply chain.
06/01/2023
Apria Healthcare Data Breach Exposed Sensitive Information of Nearly 2 Million Patients
Apria healthcare data breach has exposed the personal, medical, and financial information of up to 1.8 million individuals.
05/31/2023
How audio deepfakes can trick employees into falling for a phish
They’re a “labor of love” requiring effort, but audio deepfakers have had success.