Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

ICS Security Is a Team Sport

As we discussed in the first article in this series, there are many Internet-exposed control systems, but they are very different from traditional IT systems and require a different security approach. With these systems being so critical and controlling processes that can potentially lead to loss of life if they fail, what is being done to tackle this issue? In this article I’ll dive into this and more, looking at.

ARMO selected by Orange Business to Secure its Managed Kubernetes Services

We’re honored to share a new partnership with Orange Business (Norway), a global leader in digital services. ARMO was selected to secure Orange Business’ new Managed Kubernetes Service (MKS) with ARMO’s advanced runtime-driven cloud security platform. This collaboration marks a significant milestone in delivering robust security solutions for on-premises Kubernetes environments for Orange Business.

Threat intelligence feeds: essential arsenal in cybersecurity

Cyber threats are relentless, sophisticated, and growing. To stay ahead, you can no longer treat threat intelligence as an optional tool—it’s the backbone of a proactive, defense-ready strategy. Threat intelligence feeds bring crucial insights to security teams, from high-level trends to detailed indicators of compromise (IoCs). But no single feed can capture every potential threat. Threat landscapes evolve rapidly and adversaries employ diverse techniques and targets.

Understanding CVE-2024-50340 - Remote Access to Symfony Profiler

According to security researcher nol_tech CVE-2024–50340 is a critical vulnerability (CVSS: 7.3) affecting Symfony applications when the PHP directive register_argc_argv is enabled. By appending ?+--env=dev to a URL, attackers can force the application into the dev environment, granting remote access to the Symfony profiler. This exposure can lead to the leaking of sensitive information and potentially executing arbitrary code.

Trustwave and Cybereason Join Forces to Create a Leading Global MDR Provider, Offering Unmatched Cybersecurity Value

I am thrilled to share some monumental news that marks a significant milestone in our journey of fortifying the cybersecurity landscape. Today, Trustwave is announcing a definitive merger agreement with Cybereason, a leader in Endpoint Detection and Response (EDR), to offer a comprehensive and expanded suite of cybersecurity solutions.

Extending Developer Security with Dev-First Dynamic Testing

Today, we announced the exciting news that Snyk has acquired Probely, a fast-growing modern provider of API Security Testing and Dynamic Application Security Testing (DAST). With this addition, Snyk now offers a full range of development and application security solutions, with customers immediately benefiting from a broader range of developer friendly testing techniques.

Step-by-Step: How to Setup Homelab to Practice Penetration Testing at Home

Cybersecurity is more important than ever, so anyone who wants to work in penetration testing or ethical hacking needs to have hands-on skills. Setting up a home lab to do penetration testing is a good way to get hands-on training in a safe, controlled setting. Cyberattacks went up by more than 38% in 2023, which created a need for skilled workers who can find weaknesses and keep networks safe.

How a Compliance Management System Can Strengthen Corporate Governance

Corporate governance isn't just about making money; it's also about creating an atmosphere of honesty, responsibility, and right behavior. A Compliance Management System (CMS) is a key part of fostering this mindset because it helps companies follow the rules set by regulators. As rules and regulations change all the time, a content management system (CMS) helps businesses stay in line while reducing risks.