Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A Deep Dive into Penetration Testing of macOS Applications (Part 3)

This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their analysis techniques. Now, we will focus on client-side attacks in macOS applications. In penetration testing, the goal is to identify vulnerabilities in the app. To do that effectively, it’s important to understand how these attacks work. So, let’s dive in and learn more!

Reporting AppSec risk up to your CISO

For security leaders, building a strong working relationship with your CISO often comes down to your ability to provide clear reports and concise risk summaries. Your reports allow CISOs to perform a vital responsibility of their role: translating highly technical security jargon into actionable recommendations that will reduce risk and improve security maturity across the organization. And in the case of a breach or zero-day event, CISOs may be the bearer of bad news.

Introducing Cato EPP: SASE-Managed Protection for Endpoints

As cyber threats continue expanding, endpoints have become ground zero in the fight to protect corporate resources. Advanced cyber threats pose a serious risk, so protecting corporate endpoints and data should be a high priority. Endpoint Protection Platforms (EPPs) are the first line of defense against endpoint cyber-attacks. It provides malware protection, zero-day protection, and device and application control. Additionally, EPPs serve a valuable role in meeting regulatory compliance mandates.

2.7 SecurePortal Update: Did You Say Dashboard Widgets?

‍A trusted authority in cybersecurity, our Product & Systems Owner boasts a proven track record in Penetration Testing. Their clear communication empowers teams to take decisive action towards a safer digital environment. Confident, professional, and insightful, they are a valuable asset in today's digital world.

Pros and Cons of Open-Source Software to Support Critical Infrastructure

Open-source software is becoming a top choice for professionals. From completing internal tasks to supporting public-facing servers, you can see open-source applications everywhere. But before you start using such software for critical infrastructure, you must understand its pros and cons. Once you know both sides of the open-source software, it would be easy to conclude whether to use it or not.

Unlocking Efficiency: Building Automation in ThreatQ Threat Intelligence Platform

Staying ahead of evolving threats is crucial for organizations in all industries. Threat intelligence platforms ( TIPs) play a pivotal role in this endeavor, providing a centralized hub for collecting, analyzing, and disseminating threat intelligence. Introducing the ThreatQ Platform, purpose-built for threat detection and response. To further enhance its capabilities, organizations can leverage automation, streamlining processes and fortifying their cybersecurity posture.

Defending Against OAuth App-Based Attacks on Enterprise SaaS

The phenomenal growth in the adoption of software as a service (SaaS) has prompted enterprises of all sizes to move their critical data to SaaS-based applications. And as attackers tend to follow data to induce a breach, their new area of focus is enterprise SaaS. The recent Midnight Blizzard attack by nation-state actors clearly reinforces the fact that this trend has only just begun.

Teleport Starts Issuing CVEs

Teleport is an open source company. We develop in the open, including full disclosure of security issues in our changelogs and pull requests. We share our penetration tests and key compliance reports. Despite this, our communication to open source users and integration with automated security tooling needed improvement. We needed a standardized way to refer to our vulnerabilities so that when two people (or systems) talk about a vulnerability, they know they’re talking about the same thing.