Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PGP Decryption Bypass in Flutter Application

During the assessment of one of the financial applications built upon the flutter framework, we came across that the application was using PGP encryption for encrypting the API requests. It is pretty common for financial applications to be implementing traffic encryption, with AES seen to be the preferred algorithm for encrypting traffic. There is plenty of research already available on decrypting AES encrypted traffic.

5 benefits of integrating corporate SIEM systems

A company can accumulate massive amounts of information that security analysts are not able to monitor instantly. This can mean that priority security alerts either go unnoticed or are considered a false alarm because the appropriate technology is not available, which results in organizations failing to take action in time.

What is Data Execution Prevention (DEP)?

Handling our system memory safely and protecting it from harmful programs and other programs that are prone to executable code run from a data page on different memory locations and specific data section is a challenging task. The essential Windows programs and services have been a big step forward in easing that task.

Why you need a Kubernetes admission controller

Unless you have experience as a Kubernetes operator or administrator, admission controllers may be a new feature for you. These controllers work mostly in the background and many are available as compiled-in plugins, but they can powerfully contribute to a deployment’s security. Admission controllers intercept API requests before they pass to the API server and can prohibit or modify them.

How Your Cybersecurity Score Impacts Your Stock Price

Your cybersecurity score impacts your stock price. Here’s how: The value of a company’s stock is based on trust. Investors need to trust that the company will perform well, sustain its competitive advantage, and protect its customers’ information. When a company gets hacked, it betrays that trust, influencing its credibility. We have seen the stock price of Equifax, SolarWinds, etc., drop after they suffered data breaches.

Trustwave Recognized in Gartner's 2022 Market Guide for Managed Security Services

Gartner has recognized Trustwave as a Representative Vendor in the analyst firm’s March 2022 Market Guide for Managed Security Services (MSS). In addition, Gartner previously recognized Trustwave as a leader in its MSS solution in its 2019 Gartner “Magic Quadrant for Managed Security Services, Worldwide.”

How to generate a Software Bill of Materials (SBOM) using Veracode Software Composition Analysis

In this video, we’ll demo how to use the SBOM API with Veracode Software Composition Analysis (SCA) to generate a Software Bill of Materials (SBOM). The new SBOM API provides an inventory of components within your application with insight into the relationships between the components. Exported in CycloneDX format, the SBOM identifies which components are coming from 3rd party sources and offers visibility into your software supply chain.

Generating fake security data with Python and faker-security

Snyk recently open sourced our faker-security Python package to help anyone working with security data. In this blog post, we’ll briefly go over what this Python package is and how to use it. But first, we’ll get some context for how the factory_boy Python package can be used in combination with faker-security to improve your test-writing experience during development. Note: Some knowledge of Python is helpful for getting the most out of this post.