Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Featured Post

2025 Predictions - Navigating Through the Challenges and Opportunities Ahead

As we enter 2025, the global economic landscape remains a mix of challenges and potential shifts that will shape markets and industries worldwide. From high interest rates to the evolving impact of AI, there are several key factors that will define the year ahead. While there will be friction in some areas, persistence, agility and out-of-the-box thinking will ensure a competitive edge.

A CISO's View on Building an API Security Program in 2025

As we enter the new year, the API security landscape continues to evolve. The volume and complexity of APIs attacks has increased. CISOs and security teams should evaluate their current tools and programs for changes. In this webinar, we bring together CISOs to discuss what changes and threats should be considered in API security programs for the new year. Together, we’ll examine and discuss.

Understanding OSS security, quality, and license risks in Black Duck SCA | Black Duck

In this video, we unveil the three fundamental views of Software Composition Analysis (SCA) risk within Black Duck: Security, License, and Operational. Join us as we navigate the landscape of open source components to identify vulnerabilities, license obligations, and component health.

Simplifying Backup and Recovery for VMware Tanzu Kubernetes with CloudCasa

In the modern Kubernetes ecosystem, VMware Tanzu has emerged as a popular platform for enterprises deploying containerized workloads. To meet Tanzu Backup and disaster recovery needs, Tanzu relies on Velero, an open-source solution, for backing up and restoring cluster resources and persistent volumes.

Phishing Campaign Abuses Legitimate Services to Send PayPal Requests

A phishing campaign is abusing Microsoft 365 test domains to send legitimate payment requests from PayPal, according to Fortinet’s CISO Dr. Carl Windsor. Windsor found that the threat actor registered a free MS365 test domain and used it to create a distribution list containing targets’ email addresses. The scammer then used this distribution list to send payment requests via PayPal’s web portal.

Malicious WordPress Plugin Assists in Phishing Attacks

Researchers at SlashNext warn that cybercriminals are using a WordPress plugin called “PhishWP” to spoof payment pages and steal financial information. The spoofed pages are designed to steal payment card numbers, expiration dates, CVVs, and billing addresses. The plugin can also intercept one-time passwords generated to secure the transactions. The stolen data is immediately sent to the crooks via Telegram as soon as the victim hits “enter” on the phishing page.

Securing the Future: DevSecOps in Action

How can you ensure your software supply chain is resilient and ready for the challenges of tomorrow? In this exclusive session, we delved into the practical lessons of 2024 and showcased how JFrog is leading the charge in securing DevOps pipelines. In this engaging conversation between industry experts, we uncovered real-world insights, explored actionable strategies, and demonstrated innovations that safeguard your software delivery lifecycle.

Secure AI Agent Development: Trends and Challenges

In the rapidly evolving landscape of artificial intelligence (AI), the development of AI Agents has become a focal point for enterprises… nearly all of them. According to recent IBM research, 99% of respondents are exploring or actively developing AI agents. This surge in interest also serves to underscore the necessity for secure AI agent development.