Application Security From Code to Cloud – An Interview with Lotem Guy at Cycode
In a recent interview with Lotem Guy, VP of Product at Cycode, providing an innovative Application Security Posture Management (ASPM)...
Read more →In a recent interview with Lotem Guy, VP of Product at Cycode, providing an innovative Application Security Posture Management (ASPM)...
Read more →A known ransomware group on Monday started publishing data allegedly stolen from the systems of Japanese watchmaking giant Seiko. Seiko...
Read more →There’s mounting evidence that Akira ransomware targets Cisco VPN (virtual private network) products as an attack vector to breach corporate...
Read more →The current rise of the Internet of Things (IoT) is at its peak and rapidly expanding its abilities by transforming...
Read more →New research released today from ThreatX, the leading API and application protection platform, reveals that consumers believe today’s cybersecurity talent...
Read more →Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT....
Read more →By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity...
Read more →By Giri Radhakrishnan, Technical Product Marketing Manager, Tigera Distributed Denial-of-Service (DDoS) attack techniques are evolving, creating new risks and challenges...
Read more →A recent HiatusRAT campaign has been targeting a US military procurement system for reconnaissance, cybersecurity firm Lumen reports. Initially observed...
Read more →Microsoft is adding the Python programming language to Microsoft Excel, allowing users to create powerful functions for analyzing and manipulating...
Read more →A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data...
Read more →By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network,...
Read more →