Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Web Application Security for DevOps: Site and Origin Dynamics and Cross-Site Request Forgery

This is a continuation of the series on web application security. If you haven't already read through part 1, this is a good time to go back. If not, let's move on and answer the question left hanging during our last installment: how do browsers know which site set the cookies in the first place? And what constitutes the same site?

Attributes and Types of Security Testing

Security testing aims to find vulnerabilities and security weaknesses in the software/ application. By subjecting the software or application to controlled security scenarios, cyber security testing ensures that the system is adequately prepared to withstand attacks and unforeseen failures. Security experts and testers use different types of security testing to identify potential threats, measure the probability of exploitation of vulnerabilities, and gauge the overall risks facing the software/ app.

Mastering Problem Solving in Engineering: Mindsets for Success

In today's rapidly evolving technological landscape, problem-solving skills are the cornerstone of success in the field of engineering. From debugging complex code to enhancing system performance and robustness, the ability to efficiently identify, analyze, and resolve issues is a hallmark of a proficient tech engineer. One company that exemplifies this ethos is Rubrik, known for its innovative cyber resilience solutions.

Understanding the Dora Compliance: A Comprehensive Guide

Technology is always brimming with advancements, and it is more prominent in the financial sector. As financial institutions increasingly rely on digital infrastructure to enhance operations, customer experience, and security, they also face growing challenges in mitigating the risks that come with it, such as cyber threats, system failures, and other operational vulnerabilities.

Top 10 Static Application Security Testing (SAST) Tools in 2025

Imagine you’re all prepared to roll out your latest feature, and suddenly, right before launch, you discover a security vulnerability concealed in your code. Depending on the severity, developers can spend anywhere from 7 hours to days or even months finding and fixing these vulnerabilities. A critical vulnerability could set your release back by weeks, while a simple fix might take a day.

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that impersonated a tech support company and propagated via Google Groups. Since then, we have observed more spam campaigns using this hybrid form of cyberattack with varying tactics, techniques, and procedures (TTP). Between July and September, we witnessed a 140% increase in these spam campaigns. In this blog, we will showcase the different spam techniques used in these phishing emails.

LLM Guardrails: Secure and Accurate AI Deployment

Deploying large language models (LLMs) securely and accurately is crucial in today’s AI deployment landscape. As generative AI technologies evolve, ensuring their safe use is more important than ever. LLM guardrails are essential mechanisms designed to maintain the safety, accuracy, and ethical integrity of these models. They prevent issues like misinformation, bias, and unintended outputs.

Cybersecurity Awareness Month: The Great Offensive Security/Active Defense Strategy

It’s Cybersecurity Awareness Month and you know what that means. We spend every spare hour waiting for The Great Pumpkin. As many of us know, (and we’re going to stretch this analogy to the limit) Linus actively created an environment that would attract The Great Pumpkin by establishing the sincerest pumpkin patch in the neighborhood. Furthermore, he went on the offensive to attract others to his belief that The Great Pumpkin would appear on Halloween night.

What a 3-Year Plan to Cut Software Risks by 75% Looks Like

Organizations face an increasing number of software security threats that can compromise their sensitive data and disrupt business operations. To effectively manage these risks and enhance their security posture, it’s crucial for organizations to adopt modern application risk reduction strategies that not only mitigate potential vulnerabilities but also provide clear, actionable next steps and insights for reporting purposes.