28
Apr
2023

New infosec products of the week: April 28, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, Arista Networks, Cyera,Eclypsium,…

Time to Issue Your Own Cyber Executive Order
28
Apr
2023

Time to Issue Your Own Cyber Executive Order

Time is not kind to the security of an organization. The longer you wait, the weaker you are. The more…

Git Project Security Vulnerabilities
28
Apr
2023

Git Project Flaws Let Attackers Execute Arbitrary Code

A fresh set of Git releases was made available to fix several security flaws. It gives attackers the ability to…

28
Apr
2023

Phishing-resistant MFA shapes the future of authentication forms

Over the last two years, respondents reported a continued reliance on the least secure forms of authentication, including traditional usernames…

Detectify security updates for 13 July
28
Apr
2023

Detectify security updates for 13 July

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…

28
Apr
2023

5G surpasses expectations, becomes a global game-changer

5G connectivity has reached a tipping point globally as 5G networks are now active in 47 of the world’s 70…

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help
28
Apr
2023

The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help

Software Supply Chain Attacks Are On the Rise  Because open source component use is widespread in cloud-native application development, software…

Many Public Salesforce Sites are Leaking Private Data – Krebs on Security
28
Apr
2023

Many Public Salesforce Sites are Leaking Private Data – Krebs on Security

A shocking number of organizations — including banks and healthcare providers — are leaking private and sensitive information from their…

Detectify achieves ISO 27001 Certification
28
Apr
2023

Detectify achieves ISO 27001 Certification

The audit process and certification demonstrates the Detectify company wide commitment to information security and data protection. STOCKHOLM — July…

28
Apr
2023

ChatGPT writes insecure code

Researchers have found that ChatGPT, OpenAI’s popular chatbot, is prone to generating insecure code. Research by computer scientists associated with…

How attackers evade traditional AV and how to stop them
28
Apr
2023

How attackers evade traditional AV and how to stop them

Find threats camouflaging themselves in RAM. When you hear about malware, there’s a good chance you think of sketchy executables…

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security
28
Apr
2023

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security

HackerOne CEO, Marten Mikos, kicked us off by talking about the last year in cybersecurity.  “New and significant attacks related…