Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Handling security vulnerabilities in Spring Boot

In the world of software development, managing dependencies is a core part of creating strong and secure applications. Spring Boot, a favorite among Java developers, makes building applications easier, but there's more to it than meets the eye. Keeping your dependencies in check is crucial to ensure that your Spring Boot projects run smoothly and remain resilient in the face of ever-evolving threats.

Snyk is your security companion for Amazon CodeWhisperer

Your developer teams plan to adopt a generative AI coding tool, but you — a security leader — have compliance and security concerns. Most important of which being, what if you can’t keep pace with your developers and something significant slips through the net? Luckily, you can stay secure while developing at the speed of AI with Snyk, the security companion for Amazon CodeWhisperer.

Integrating ESG Into a TPRM Program: Mitigating Operational Risk

Environmental, social, and governance (ESG) is a framework that holistically assesses the sustainability of a business or investment. Investment groups, business continuity planners, enterprise risk management personnel, and third-party risk management (TPRM) programs utilize ESG to manage sustainability risks.

What Is Email Spoofing and How Does It Work?

Email spoofing is a type of cyber threat where a cybercriminal sends emails to potential victims using fake sender addresses. Email spoofing works by forging a sender address to make it seem as though it’s coming from a legitimate person or company. Email spoofing is a tactic typically used by cybercriminals when carrying out phishing attacks to encourage their targeted victim to send them sensitive information.

Trustwave's 2023 Retail Threat Intelligence Report: Gaining Access

The Trustwave SpiderLabs team's recent in-depth look at the threats facing the retail landscape has uncovered a wide array of adversaries actively attacking this sector along with their tried-and-true methods of gaining access, moving laterally, and finally exfiltrating valuable data. This information is thoroughly detailed in the Trustwave Threat Intelligence Briefing: The 2023 Retail Services Sector Threat Landscape.

No One Knows How Online Pharmacy Company was Hit with a Data Breach Impacting 2.3 Million Customers

This is a cautionary tale of both how your data can legally end up in the hands of an organization you never intended and how victims can be largely left in the dark post-breach. Normally when there’s a press release from an organization hit by a data breach, there are at least a few details that let customers know the company has a handle on what transpired, that the breach has been mitigated, and what customers impacted should do to protect themselves.

The best security events to attend in 2024, according to security pros

With security team workloads increasing year-on-year, it’s no surprise that practitioners are selective about the cybersecurity events and conferences they attend. But despite reporting high levels of understaffing and burnout, most security pros find the time to attend these events. According to the 2023 Voice of the SOC report, which surveyed 900 practitioners in the US and Europe, 81% have attended at least one conference in the past two years.

Unveiling the MOVEit Vulnerability

In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is a perpetual challenge for businesses. One recent vulnerability that has sent shockwaves through the corporate world is the MOVEit vulnerability. This flaw, discovered in widely used file transfer software, has had a profound impact on companies across various industries.

The Role of Artificial Intelligence in Cybersecurity

The integration of artificial intelligence (AI) into various domains has become ubiquitous. One area where AI’s influence is particularly pronounced is in cybersecurity. As the digital realm expands, so do the threats posed by cybercriminals, making it imperative to employ advanced technologies to safeguard sensitive information.