Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to prevent log injection vulnerability in JavaScript and Node.js applications

In many standard enterprise applications, consistent logging serves a multitude of purposes. It helps businesses identify and rectify errors, provides valuable analytical insights, and lets you test new solutions. However, this also makes log injections one of the most common ways hackers can hijack or even gain access to sensitive user information.

The Power of Platform-Native Consolidation in Application Security

The application security landscape is shifting as organizations move away from a fragmented ecosystem of point solutions towards a unified platform such as the Mend AppSec Platform. Leveraging these platform-specific strengths brings numerous advantages: streamlined workflows, a cross-product workflow engine, a consolidated data model that enhances security posture, and developers that can focus fully on innovation.

ChatGPT vs Cyber Threats - The REAL Role of AI in Cybersecurity

By James Rees, MD, Razorthorn Security In the rapidly evolving world of cybersecurity, artificial intelligence (AI) and large language models (LLMs), have become buzzwords that seem to promise revolutionary solutions. However, as with any emerging technology, it’s crucial to separate hype from reality.

Navigating the Future: Key EU Cybersecurity Regulatory Frameworks for 2024-2029

The European Union (EU) is leading the development of comprehensive cybersecurity regulations. These frameworks shape secure digital environments and protect businesses and citizens from cyber threats. For industry leaders and cybersecurity practitioners, especially those focused on cloud technologies, understanding and navigating these frameworks is key to maintaining compliance and gaining a competitive edge.

Ten Ways You Can Avoid Debit Card Fraud

Having your debit card information stolen or used by someone else to impersonate you can be stressful and damaging to your finances and identity. To avoid becoming a victim of debit card fraud, you should secure your bank accounts with strong passwords, use your credit card for purchases, be cautious of phishing scams and more. Continue reading to learn what debit card fraud is and how to avoid becoming a victim of it.

Amplify SOC efficiency via automated cloud detection and response with Sysdig and Torq

Cloud attackers are swift and sophisticated, requiring robust threat detection and response programs that can keep pace with these malicious actors born in the cloud. They exploit the automation and scale of the cloud, along with new techniques, to accelerate all stages of an attack and inflict damage within minutes.

Being forced to migrate from IBM QRadar to PAN XSIAM? Know the pitfalls

Palo Alto Networks acquired IBM QRadar SaaS assets, leaving several organizations in limbo and uncertain about the future of their security information and event management (SIEM). Security teams grapple with a complex and potentially disruptive transition as Palo Alto Networks pushes and even mandates migration to its relatively new XSIAM platform.

Critical RCE Vulnerabilities Impacting HPE Aruba Networking Access Points

On September 24, 2024, Hewlett Packard Enterprise (HPE), the parent company of Aruba Networks, released a security bulletin addressing three critical command injection vulnerabilities affecting Aruba Networking Access Points. These vulnerabilities, identified as CVE-2024-42505, CVE-2024-42506, and CVE-2024-42507, could allow remote unauthenticated attackers to execute code with privileged access.