New infosec products of the week: April 28, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, Arista Networks, Cyera,Eclypsium, Halo Security, Immuta, ManageEngine, and…
Here’s a look at the most interesting products from the past week, featuring releases from Abnormal Security, Arista Networks, Cyera,Eclypsium, Halo Security, Immuta, ManageEngine, and…
Time is not kind to the security of an organization. The longer you wait, the weaker you are. The more things drag out, the higher…
A fresh set of Git releases was made available to fix several security flaws. It gives attackers the ability to execute arbitrary code upon successful exploitation. Upgrades…
Over the last two years, respondents reported a continued reliance on the least secure forms of authentication, including traditional usernames and passwords and one-time passwords…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security…
5G connectivity has reached a tipping point globally as 5G networks are now active in 47 of the world’s 70 largest economies by GDP, according…
Software Supply Chain Attacks Are On the Rise Because open source component use is widespread in cloud-native application development, software supply chain attacks present a…
A shocking number of organizations — including banks and healthcare providers — are leaking private and sensitive information from their public Salesforce Community websites, KrebsOnSecurity…
The audit process and certification demonstrates the Detectify company wide commitment to information security and data protection. STOCKHOLM — July 14th, 2020 — Detectify, the…
Researchers have found that ChatGPT, OpenAI’s popular chatbot, is prone to generating insecure code. Research by computer scientists associated with the Université du Québec in…
Find threats camouflaging themselves in RAM. When you hear about malware, there’s a good chance you think of sketchy executables or files with extensions like…
HackerOne CEO, Marten Mikos, kicked us off by talking about the last year in cybersecurity. “New and significant attacks related to high-profile supply chain vulnerabilities,…