Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

Microsoft and Black Duck DevOps Partnership: Build Secure, High-Quality Software Faster | Black Duck

Building secure, high-quality software is more challenging than ever. The bar is set high for organizations to release new features and functions without compromising the quality or security in the applications they deploy. Organizations are rapidly adopting DevOps tools and methodologies to keep up-with the demands of accelerated software delivery. They are also implementing application security testing earlier in their development workflow to develop and deploy quality code.

Mitel MiCollab Vulnerabilities: CVE-2024-35286 and CVE-2024-41713

Mitel’s MiCollab Unified Communications solutions are widely used by businesses to streamline communications. However, two critical vulnerabilities, CVE-2024-35286 and CVE-2024-41713, have been identified across several versions of Mitel MiCollab. CVE-2024-35286 has been identified in versions 9.8.0.33 and earlier and CVE-2024-41713 has been identified in versions 9.8 SP1 FP2 (9.8.1.201) and earlier.

Mend Renovate Enterprise Cloud: Dependency Updates at Scale

If there’s one thing development and security teams can agree on, it’s that updating dependencies is a worthwhile endeavor. Keeping open-source dependencies up to date reduces bugs—both now and in the long run. And whether those bugs are security vulnerabilities or functional issues, everyone is happy to see them go.

Securely bringing your own AI to Tines

At Tines, we take pride in both the flexibility and security of our platform: it’s what allows us to do things like safely connect to any HTTP API in the world, and seamlessly deploy in fully air-gapped environments. Similarly, our AI capabilities have been designed from the ground up to be secure and private, with no logging, internet transit, or training on your data.

Staying One Step Ahead: The Value of an Early-Year Cybersecurity Checkup

Staying One Step Ahead: The Value of an Early-Year Cybersecurity Checkup. It’s a new year, which means fresh goals and renewed energy. Why not channel some of that momentum into your cybersecurity strategy? While plenty of businesses wait until mid-year to run their reviews, getting a head start now can help you stay ahead of ever-evolving threats. Here’s why an early-year cybersecurity checkup is a game-changer—and how to make the most of it.

What You Need to Know about the Scholastic Data Breach

Established in 1920, Scholastic is an American-based multinational and the largest publisher and distributor of children’s books globally. The company’s global headquarters is in New York City. It offers digital and print resources to support learning for pre-kindergarten to grade 12 students. Some of the corporation’s popular children's book series are Clifford the Big Red Dog, Harry Potter, Goosebumps, SPY, Animorphs, and Hunger Games.

Massive Credit Card Leak Discovered by LEAKD.COM

Recently, the security team at LEAKD.COM discovered that about 5 million United States credit cards and users’ personal details had been leaked online. This discovery came about when the security team found 5 terabytes of sensitive data exposed on an unsecured Amazon S3 bucket, a cloud storage service provided by Amazon Web Services that is used to store customer information. According to the security team at LEAKD.COM, the party responsible for this credit card leak/breach remains unknown.

How the SMS Hack Exposed U.S. Telecom Security Risks

Popularly known as text messages, SMS messages are one of the widely used communication channels by Americans. They are generally used for various purposes. For instance, besides being a channel of communication among individuals, several millions of Americans rely on SMS systems to access and secure their social media, email, and online banking accounts, particularly through OTPs (one-time-passcodes), which are typically delivered via SMS.

How to Optimize Test Management in Jira: Solutions for Common QA Challenges

Over the years, one question seems to come up again and again for QA professionals and testers: “How can we manage test cases efficiently?” It is a challenge that teams across the world face every day, and it is critical to address for successful software development. While we might joke about gathering hundreds of testers in one room to debate the answer, the reality is that testers rarely have time for such discussions.

Future-gazing: How API Security Will Evolve in 2025

Who doesn’t love a little glimpse into the future? For cybersecurity—and more specifically, API security - gazing into the magic crystal ball may not strictly be necessary. But there are definite trends that will evolve for 2025 and make API security even more of an imperative for modern businesses. Here are our top five.