Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

3 tips from Snyk and Dynatrace's AI security experts

McKinsey is calling 2023 “generative AI’s breakout year.” In one of their recent surveys, a third of respondents reported their organizations use GenAI regularly in at least one business function. But as advancements in AI continue to reshape the tech landscape, many CCISOs are left grappling with this question: How does AI impact software development cycles and the overall security of business applications?

How to Streamline Security Incident Management & Response

A security incident refers to an attack on an organization's cybersecurity system, network, or data. All types of attacks, violations, or exploitations can be classified as security incidents, regardless of their impact. This blog post will provide you with a solid understanding of Security Incident Management and Response and how streamlining this process can enhance your company’s workflow.

CVE-2024-21591: Critical Junos OS Vulnerability Could lead to Unauthenticated Remote Code Execution

On January 10, 2024, Juniper Networks released patches to remediate a critical vulnerability (CVE-2024-21591) in Junos SRX and EX series devices. CVE-2024-21591 could allow a threat actor to cause a denial of service (DoS) or achieve unauthenticated remote code execution (RCE) with root privileges. The vulnerability impacts the J-Web component of Junos OS, the operating system running on the devices. The vulnerability was discovered during external security research.

CVE-2023-6548 & CVE-2023-6549: DoS and RCE Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway

On January 16, 2024, Citrix published a security bulletin disclosing two zero-day vulnerabilities (CVE-2023-6548 & CVE-2023-6549) being actively exploited in Citrix NetScaler ADC and NetScaler Gateway.

Navigating Your Digital Health: A Comprehensive Guide for Data Privacy Day January 28th

We should all be concerned with our health and well-being. For the most part, we all aspire for good health. Now that doesn’t always mean we are perfect, but we understand the changes and course corrections necessary to feel better physically, mentally, and emotionally. This may include actions like getting more sleep, exercising regularly, routine doctor’s visits and making better food choices along the way.

A Step-by-step Guide to URL Verification in Indusface WAS

To initiate an Indusface WAS vulnerability scan on your URL, confirming ownership of the URL or domain being scanned is essential. This verification is an additional security measure to prevent unauthorized users from conducting scans on your URL or domain and revealing potential vulnerabilities. There are 3 different methods to verify your URL.