Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2021-38297 - Analysis of a Go Web Assembly vulnerability

The JFrog Security Research team continuously monitors reported vulnerabilities in open-source software (OSS) to help our customers and the wider community be aware of potential software supply chain security threats and their impact. In doing so, we often notice important trends and key learnings worth highlighting.

Decentralized Clinical Trials: What Biotechs Need to Know

The buzz around decentralized clinical trials, or DCT, has captured the attention of organizations across the clinical research industry, prompting no small degree of excitement, apprehension, and speculation. DCT has some in the industry cheering, some biting their nails, and others scratching their heads. But what exactly does DCT mean—and will it truly change clinical research?

Exploit vs. Vulnerability: What Is the Difference?

Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it differ from an exploit? A vulnerability is a gap in the armor or weakness that allows people to enter. The exploit is the mechanism that someone uses to get in. For example, a door with a fragile lock has a vulnerability. The exploit uses the keys, hammer, or lockpick to break the lock.

Brace Yourselves: OV Code Signing Certificate is Changing from November 15, 2022

Cyber perpetrators don’t leave a single stone unturned when discovering security loopholes, no matter how thin their chances of success are. That’s why authorities such as CA/B Forum must stay a step ahead, tighten their policies and minimize security breaches. One such change is occurring from November 15, related to OV Code Signing Certificates. From November 15, 2022, OV code signing certificates will require a hardware security module to store their private key.

What Is the Average Cost of a Data Breach in India?

According to the IBM Security Data Breach Report of 2022, India's average data breach cost is at a record high of Rs 17.6 crore (Rs 175 million, which is around $2.2 million) for the fiscal year of 2022. This is a 6.6% increase from last year's Rs 16.5 crore and an uptick of 25% from the average cost of Rs 14 crore in 2020, as stated by IBM analysts.

What are the best practices in Digitizing Customer Onboarding? What are the technologies involved?

A new client’s onboarding in banking might take days of information gathering, application completion, identity verification, printing or emailing, and waiting for the consumer to sign and return the paperwork. Every day that goes by, increases the likelihood that the consumer may become impatient and discover more rapid competition. Additionally, manual paperwork attracts errors that contribute to costs and delays.

Modernize and Migrate to Egnyte to Replace Your Windows File Server

For decades, Microsoft’s Windows Server has been a mainstay for businesses of all sizes, most notably as a file server. However, as companies adapt to remote work, increasing cyber threats, and growing data privacy regulation, many are considering shifting their Windows file server to the cloud—or replacing it altogether. Egnyte is a great fit for companies looking to migrate their Windows file server to a modern platform designed for the new way of work.

5 Quick Takeaways from the Verizon Mobile Security Index 2022

Netskope is proud to have again contributed data and insights to Verizon’s annual Mobile Security Index, one of the most influential reports in the industry for evaluating mobile security trends. This report is based on a survey of hundreds of professionals responsible for buying, managing, and securing mobile and IoT devices, making it highly relevant to cybersecurity decision makers who deal with the challenges of hybrid work. Here are some of the highlights.

AsyncRAT: Using Fully Undetected Downloader

AsyncRAT is an open-source remote administration tool released on GitHub in January 2019. It’s designed to remotely control computers via encrypted connection, providing complete control via functionalities such as: Although the official GitHub repository contains a legal disclaimer, AsyncRAT is popularly used by attackers and even some APT groups. Netskope Threat Labs recently came across a FUD (Fully Undetected) Batch script which is downloading AsyncRAT from an Amazon S3 Bucket.