Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Beyond Snapshots: The Need For Continuous Penetration Testing

By James Rees, MD, Razorthorn Security Times must change (and always will) and nowhere is this more true than in the realm of technological advancement. Thirty years ago, the technological landscape was vastly different from what we have today and technological change has outpaced Moore’s Law for some time now. Information security must keep pace with these advancements. This has become especially true with the advent of AI.

Understanding OWASP Top 10 Client-Side Risks

Websites rely heavily on client-side code to deliver interactive user experiences. Unlike server-side code, which is protected within an organization’s infrastructure, client-side code runs in the user’s browser and is exposed to various risks such as data theft and JS injection. Recognizing the unique challenges of securing client-side code, OWASP has created a dedicated Top 10 list for client-side security risks.

The Role of Network Forensics in Identifying Threats

The outlook of cyber threats in this modern cyber warfare theater has changed a great deal. Annually, 60% businesses drop victims to data breaches and cyber-attacks. Security teams intrinsically find themselves in a scenario whereby they lack visibility and control of the network traffic and are incidentally unable to detect and respond in real-time. To this regard, modern cybersecurity strategies now incorporate network forensics into their arsenal of defenses.

ASPM and Modern Application Security

Gartner’s 2024 Hype Cycle for Application Security is making the rounds, and Application Security Posture Management (ASPM) continues to climb up and around the famous curve, from the Peak of Inflated Expectations in 2023 to this year’s slide towards the Trough of Disillusionment. That’s pretty fast movement for a technology that we haven’t yet succeeded in clearly defining!

Best Practices for Creating Strong Passwords You'll Remember

Making sure your password is strong yet memorable can be challenging and stressful. However, following best practices – like using passphrases, incorporating acronyms and relying on a password manager – will ensure your passwords are strong and safe. A strong password should contain at least 16 characters, with a combination of uppercase and lowercase letters, numbers and symbols.

The Downloadable Risk Assessment Template for Cybersecurity [XLS]

Every day, new headlines emerge about another major corporation falling victim to a cyberattack, leaving businesses everywhere questioning their vulnerabilities. These breaches underscore the critical need for thorough risk assessments to identify and mitigate potential weaknesses. Proactively managing risks enables organizations to better defend against the relentless wave of cyber threats.

How to Prevent Malware Attacks from Impacting Your Business

A robust malware prevention and detection strategy is critical to cyber security and cyber resilience today. After all, a single malware infection can inflict serious financial damage — from business disruptions and remediation costs to lasting reputational damage and customer churn. To help, this blog explains the types of malware organizations need to defend against and the common vectors for deployment.

Can We Truly Test Gen AI Apps? Growing Need for AI Guardrails

Unlike traditional software, where testing is relatively straightforward, Gen AI apps introduce complexities that make testing far more intricate. This blog explores why traditional software testing methodologies fall short for Gen AI applications and highlights the unique challenges posed by these advanced technologies.

Meduza Stealer: Detailed Analysis of its Features, Capabilities, and Recent Updates on Active C2

The Meduza Stealer, a malware designed for comprehensive data theft, first appeared on dark web forums on June 12, 2023. It was introduced by a mysterious actor known only as 'Meduza,' with prices ranging from $199 to $1199. Since its emergence, it has gained attention across cybercriminal communities for its potent capabilities.