Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Financial cybercrime trends: Reverse BEC & ‘shoxing’

    Financial cybercrime trends: Reverse BEC & ‘shoxing’

    Turla — a Russian advanced persistent threat (APT) group closely affiliated with the FSB Russian intelligence agency —..

    Cybersecurity Insights with Contrast CISO David Lindner | 7/21

    Cybersecurity Insights with Contrast CISO David Lindner | 7/21

    Insight #1 WormGPT is a thing. The tool — being sold on hacker forums and considered “ChatGPT’s evil cousin” — shows..

    Treat ALL data — not just PII — as if it’s regulated

    Treat ALL data — not just PII — as if it’s regulated

    Poor, poor Boston Globe.

    Why aren’t people patching the MOVEit bug?

    Why aren’t people patching the MOVEit bug?

    Know anything about CL0P, the ransomware gang connected to an attack on the popular MOVEit Transfer file-transfer..

    Contrast Assess rescues Snap Finance from drowning in vulnerability flood

    Contrast Assess rescues Snap Finance from drowning in vulnerability flood

    It’s enough to make your eyes cross: Floods of vulnerabilities pour in from disparate sources and tools.

    Considered harmful: Blindly shifting left

    Considered harmful: Blindly shifting left

    The motivation behind “shift left” security is sound.

    Cybersecurity Insights with Contrast CISO David Lindner | 7/14

    Cybersecurity Insights with Contrast CISO David Lindner | 7/14

    Insight #1 Big news from Contrast! I’m proud to announce that we’re open sourcing our internal AI policy. By sharing..

    Contrast Responsible AI Policy Project: Keeping your business safe in the AI era

    Contrast Responsible AI Policy Project: Keeping your business safe in the AI era

    Contrast Security is announcing the launch of the Contrast Responsible AI Policy Project, a pioneering initiative in..

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 7/7

    Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 7/7

    Insight #1 When responding to a ransomware attack, recognize that most ransomware will deploy a remote-access Trojan..