Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Prepare for 90-Day TLS Certificate Lifespans with Automation

The discussion about managing the impact of shorter TLS certificate lifespans began with the proposal from Google to shorten the lifespan of public-facing certificates to 90 days. And then the plot thickened when Apple jumped in with a 45-day certificate proposal. We’re not fortune tellers, but we do believe these changes, or something close to them, will happen in the not-too-distant future.

Ensure IP forwarding is disabled a RHEL Benchmark

IP forwarding in Linux is a feature that allows a system to route packets between network interfaces, effectively functioning as a router. While this capability is essential for specific network setups, it poses security risks if enabled unnecessarily. Disabling IP forwarding is a critical step in server hardening, particularly for systems not intended to perform routing tasks.

Top 10 Software Composition Analysis (SCA) tools in 2025

85% of the code that we use doesn’t come from our own code, it comes from our open-source components and dependencies. This means attackers can know your code better than you do! SCA tools are our best line of defense to keep our open-source supply chain secure. Software Composition Analysis (SCA) tools, also known as open-source dependency scanning, help us understand the risks we have in our open-source supply chain.

Zombie APIs: The Undead Threat to Your Security

Zombie APIs, sometimes called “orphaned” or “forgotten” APIs, refer to endpoints that were initially deployed for a specific purpose but are no longer actively used or maintained. These APIs are often left operational within an organization’s infrastructure due to oversight or incomplete decommissioning processes.

The State of Magecart: A Persistent Threat to E-Commerce Security

Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward five years and it is still here going strong. During the pre-holiday season, cybercriminals ramped up their efforts to target e-commerce websites, aiming to steal cardholder and personal information. These attacks, collectively known as Magecart, have been active since 2015, named after the Magento e-commerce platform with "cart" referencing shopping carts — their initial primary targets.

Securing GenAI Development with Snyk

From design to deployment, the rise in AI tools and AI-generated code is changing developers’ workflows, enabling them to focus on more creative and complex tasks. However, while 96% of developers use AI coding assistants to streamline their work, it can have a negative impact on security teams. One-fifth of AppSec teams surveyed said they face significant challenges securing AI-generated code due to how quickly it’s produced.

Reflections on 2024: Building what truly matters at Appknox

As 2024 draws to a close, I’m reflecting on a year that has been nothing short of transformative for Appknox. This was a year of bold ideas, breakthrough innovation, and meaningful partnerships. It was a year where we didn’t just meet expectations—we redefined them. In many ways, 2024 was about going back to the fundamentals of why we exist: to make mobile application security simple, scalable, and effective.

The Real Costs of Insider Threats: An In-Depth Analysis

Insider threats continue to evolve at an unprecedented pace, presenting organizations with increasingly complex security challenges. By examining findings from IBM’s Cost of a Data Breach Report 2024, Ponemon Institute’s 2023 Cost of Insider Risks Global Report, and Cybersecurity Insiders’ 2024 Insider Threat Report, we can paint a comprehensive picture of current insider threat trends and their implications.