Threats & Malware, Vulnerabilities
October 11, 2023
Via: The RegisterAfter a week of rampant speculation about the nature of the security issues in curl, the latest version of the command line transfer tool was finally released today. Described by curl project founder and lead developer Daniel Stenberg as “probably […]
Application security, Security
August 28, 2023
Via: The Hacker NewsCyber attacks on e-commerce applications are a common trend in 2023 as e-commerce businesses become more omnichannel, they build and deploy increasingly more API interfaces, with threat actors constantly exploring more ways to exploit vulnerabilities. This is why regular testing […]
Application security, Security
July 10, 2023
Via: The Hacker NewsBrick-and-mortar retailers and e-commerce sellers may be locked in a fierce battle for market share, but one area both can agree on is the need to secure their SaaS stack. From communications tools to order management and fulfillment systems, much […]
September 27, 2021
Via: Help Net Security74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more than 1,300 security leaders, business executives and remote employees conducted by Forrester Consulting. From […]
Application security, Security
September 23, 2021
Via: Help Net SecurityBusiness investment in SaaS applications continues to climb despite widespread underutilization of app licenses by employees. According to Productiv’s report, on average only 45% of company apps are being used on a regular basis. The data also shows 56% of […]
Application security, Cloud security, Security
April 20, 2021
Via: Security IntelligenceTo prevent cookie theft, have cyber defense baked in. With progressive web apps (PWA) and other relatively new protective efforts in place, how can you be sure you’re defending against today’s attackers? Here’s what enterprise needs to know about the […]
Application security, Security, Threats & Malware, Vulnerabilities
May 29, 2020
Via: Hot for SecurityNew research from Veracode found that most applications use open-source libraries that also present vulnerabilities, but the distribution of such libraries depends on the programming languages used. Open-source libraries are ubiquitous, but they are not limited to integration into open-source […]
Application security, Security, Threats & Malware, Virus & Malware
January 9, 2020
Via: TechRadarA new variant of the Clop ransomware which targets Windows 10 apps such as text editors and office applications as well as other processes has been discovered in the wild. When the Clop ransomware first appeared in February of 2019, […]
July 16, 2019
Via: Help Net SecurityArtificial intelligence (AI) is rapidly finding applications in nearly every walk of life. Self-driving cars, social media networks, cybersecurity companies, and everything in between uses it. But a new report published by the SHERPA consortium – an EU project studying […]
Application security, Network security
March 29, 2019
Via: Help Net SecurityCertificate-related outages harm the reliability and availability of vital network systems and services while also being extremely difficult to diagnose and remediate. Unfortunately, the vast majority of businesses routinely suffer from these events. In fact, according to the study released […]
March 29, 2019
Via: Help Net SecurityThe majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on – such as ERP and CRM systems – any differently than how low-value data, applications or services are secured. Even […]
January 3, 2019
Via: Security WeekANCHORAGE, Alaska (AP) — Alaska revenue officials shut down online applications for annual oil wealth checks after personal information of other users popped up on applicants’ computer screens. The private information from other applicants included names, addresses and Social Security […]
October 16, 2018
Via: Help Net SecurityCyberArk launched CyberArk Privileged Session Manager for Cloud. Through a transparent user experience, this new offering extends privileged access session isolation, monitoring and control to the most common web applications, cloud and social media platforms. As part of an integrated […]
September 25, 2018
Via: William PalmerAs more and more data and applications are moving to the cloud, organizations now face a host of new security threats and challenges. Today, cloud infrastructures appear to be the growing target among threat actors. In the last six months, […]
July 20, 2018
Via: AberdeenThe majority of applications being used today are SaaS (Software-as-a-Service) solutions accessed via the cloud. The convenience of apps such as Google’s G-Suite, Salesforce, Basecamp, and others brings with it the challenge of securing all the data being transmitted by […]
April 4, 2018
Via: Dark ReadingWeb application attacks are on the rise, according to recent figures from Akamai, which logged a 10% increase in attacks from Q4 of 2016 to the same time period in 2017. “The vast majority of web application attacks are the […]
February 7, 2018
Via: Dark ReadingCompanies overlook critical security steps as they move to adopt the latest cloud applications and services. Businesses deploying cloud-based applications and services often overlook critical security steps as they scramble to keep up with the latest technology, and the rush […]
December 12, 2017
Via: CSO OnlineAt its simplest level, machine learning is defined as “the ability (for computers) to learn without being explicitly programmed.” Using mathematical techniques across huge datasets, machine learning algorithms essentially build models of behaviors and use those models as a basis […]
March 29, 2017
Via: Radware BlogSo you’ve finally made the move and deployed one of your business applications in the cloud. You picked a leading public cloud provider (Amazon Web Services or Microsoft Azure) thinking this will get you the peace of mind you are […]
March 17, 2017
Via: Kaspersky BlogThe rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android apps every month but delete only 10, in effect adding two apps […]