Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Optimize Test Management in Jira: Solutions for Common QA Challenges

Over the years, one question seems to come up again and again for QA professionals and testers: “How can we manage test cases efficiently?” It is a challenge that teams across the world face every day, and it is critical to address for successful software development. While we might joke about gathering hundreds of testers in one room to debate the answer, the reality is that testers rarely have time for such discussions.

Mitel MiCollab Vulnerabilities: CVE-2024-35286 and CVE-2024-41713

Mitel’s MiCollab Unified Communications solutions are widely used by businesses to streamline communications. However, two critical vulnerabilities, CVE-2024-35286 and CVE-2024-41713, have been identified across several versions of Mitel MiCollab. CVE-2024-35286 has been identified in versions 9.8.0.33 and earlier and CVE-2024-41713 has been identified in versions 9.8 SP1 FP2 (9.8.1.201) and earlier.

Mend Renovate Enterprise Cloud: Dependency Updates at Scale

If there’s one thing development and security teams can agree on, it’s that updating dependencies is a worthwhile endeavor. Keeping open-source dependencies up to date reduces bugs—both now and in the long run. And whether those bugs are security vulnerabilities or functional issues, everyone is happy to see them go.

DORA Compliance: Checklist for 2025

Financial organizations across Europe are actively preparing for the Digital Operational Resilience Act (DORA), taking effect in January 2025. Meeting DORA compliance requirements has become essential for financial institutions as they adjust their operations to match new regulatory standards. The legislation brings substantial changes to information and communication technology (ICT) risk management practices, security protocols, and third-party oversight.

How the SMS Hack Exposed U.S. Telecom Security Risks

Popularly known as text messages, SMS messages are one of the widely used communication channels by Americans. They are generally used for various purposes. For instance, besides being a channel of communication among individuals, several millions of Americans rely on SMS systems to access and secure their social media, email, and online banking accounts, particularly through OTPs (one-time-passcodes), which are typically delivered via SMS.

What You Need to Know about the Scholastic Data Breach

Established in 1920, Scholastic is an American-based multinational and the largest publisher and distributor of children’s books globally. The company’s global headquarters is in New York City. It offers digital and print resources to support learning for pre-kindergarten to grade 12 students. Some of the corporation’s popular children's book series are Clifford the Big Red Dog, Harry Potter, Goosebumps, SPY, Animorphs, and Hunger Games.

Massive Credit Card Leak Discovered by LEAKD.COM

Recently, the security team at LEAKD.COM discovered that about 5 million United States credit cards and users’ personal details had been leaked online. This discovery came about when the security team found 5 terabytes of sensitive data exposed on an unsecured Amazon S3 bucket, a cloud storage service provided by Amazon Web Services that is used to store customer information. According to the security team at LEAKD.COM, the party responsible for this credit card leak/breach remains unknown.

Staying One Step Ahead: The Value of an Early-Year Cybersecurity Checkup

Staying One Step Ahead: The Value of an Early-Year Cybersecurity Checkup. It’s a new year, which means fresh goals and renewed energy. Why not channel some of that momentum into your cybersecurity strategy? While plenty of businesses wait until mid-year to run their reviews, getting a head start now can help you stay ahead of ever-evolving threats. Here’s why an early-year cybersecurity checkup is a game-changer—and how to make the most of it.