Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to interpret your Detectify score

Detectify is aiming to make security understandable and easy to work with. That is why we visualize your security status in several ways in the tool: You can track the progress over time and your Threat Score gives you an instant security level ranking. In the blog post, we will focus on how you should interpret and work with your Threat Score.

Valentines Scams

It’s that time of year again where Cupid’s arrow strikes and love is in the air. Unfortunately, with love also comes a slew of scams. People trying to take advantage of your emotions and get money out of you. This Valentine’s Day, be aware of the different scams that may be targeting you. We’ll cover how to avoid fraud, catfishing and other techniques used by scammers this Valentine’s Day. Prefer a video over a good read?

What Is an SBOM & Why Do You Need One?

Before we jump into definitions, let’s quickly level set on how we got here. Over the last few years, the way we build software has changed drastically. With the increasing need to move faster and release more frequently, organizations are opting to get rid of monolithic architectures and adopt a microservices architecture for greater agility, resiliency, and efficiency.

Government agencies warn of sophisticated, high-impact ransomware

A surge in “sophisticated, high impact” ransomware attacks has prompted the United States’s Cybersecurity and Infrastructure Security Agency (CISA), the UK’s National Cyber Security Centre (NCSC), and the Australian Cyber Security Center to issue a joint advisory about the techniques being used by cybercriminals to attack businesses and organisations.

Privileged Account and Session Management: How To Deploy It

The more access rights an employee has, the more possibilities they have to misuse or abuse privileges. According to the ENISA Threat Landscape 2021 report, a third of surveyed organizations suffered from privilege abuse by insiders during the period from April 2020 through July 2021. That’s why establishing an appropriate level of privileged account management plays a significant role in ensuring your organization’s cybersecurity.

Why push notifications are the best way to protect passwords

Are passwords still the most common strategy for protecting accounts in organizations? This Pulse password security survey reveals that 38% of respondents use between 4 and 6 password-protected accounts on a daily basis and 49% admit that their IT teams resolve an average of 9 password-related issues every day. The majority acknowledge that this has been exacerbated by remote working during recent months due to the pandemic.

What the cybersecurity executive order means for the private sector

For a variety of reasons, some more obvious than others, it’s unreasonable to expect federal and local governments to develop the software that supports their day-to-day operations. So they turn to solutions provided by private companies. This is really a win-win situation; the government gets access to best-of-breed solutions developed by experienced companies, and the vendor secures funds that help spur innovation that’s available to the public and private sector alike.

JFrog Discloses 3 Remote Access Trojans in PyPI

The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling to detect and avert potential software supply chain security threats. After validating the findings, the team reports any security vulnerabilities or malicious packages discovered to repository maintainers and the wider community.

Highlights from the Ultimate Guide to Client-Side Security

In today’s world, businesses, economies, and lives are connected by a complex spider web of code and software applications. This code and these applications drive e-commerce, financial transactions, and data input. They impact our ability to quickly transfer money from one account to another, to fill out an online mortgage application, and to order supplies from a vendor. The code that drives these systems is complicated. If something can go wrong, it will.