Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

GitGuardian's FP Remover Dramatically Reduces False Positive In Scans

Do you hate false positives in your secrets scan results? We do too. GitGuardian has introduced a whole new approach to eliminating false positives, eliminating them by around 50% so far. And we are just getting started! GitGuardian's Machine Learning experts and Secret Detection team have created "FP Remover", a new in-house machine learning model that significantly reduces false positives by understanding code context and semantics while enforcing security and privacy best practices.

Fundamentals of GraphQL-specific attacks

Developers are constantly exploring new technologies that can improve the performance, flexibility, and usability of applications. GraphQL is one such technology that has gained significant attention for its ability to fetch data efficiently. Unlike the traditional REST API, which requires multiple round trips to the server to gather various pieces of data, GraphQL allows developers to retrieve all the needed data in a single request.

CVE-2024-8517 - Unauthenticated Remote Code Execution in SPIP

A critical security flaw has been discovered in SPIP, a popular open-source content management system (CMS). This flaw, identified as CVE-2024-8517, stems from a command injection issue in the BigUp plugin. The vulnerability allows attackers to execute arbitrary OS commands remotely and without authentication, simply by sending a malicious multipart file upload HTTP request. This blog will explore the details of this vulnerability, its potential impacts, and the essential steps for mitigation.

Top 8 Vulnerability Management Challenges and How to Overcome Them

The State of Application Security report shows that over 2.37 billion attacks were blocked on AppTrana WAAP from April 1, 2024, to June 30, 2024. Attacks targeting vulnerabilities surged by 1,200% in Q2 2024 compared to last year, an alarming fact. This sharp rise highlights that vulnerabilities are the prime target. Moreover, they are now easily exploitable thanks to readily available scripts on known vulnerabilities. This could be because of rapid adoption of AI and LLM models even among hackers.

4 Simple Steps to Implement Risk-Based Vulnerability Management

Imagine if your fire alarm sensor went off every time you burned your toast or lit candles on a birthday cake. After a few false alarms, you’d probably start ignoring them or even turn your sensor off just to get some peace. This is what many information security teams are experiencing with vulnerability alerts.

Understanding the Differences Between DORA and NIS 2

Two significant pieces of European legislation stand out as cybersecurity regulations evolve: the Digital Operational Resilience Act (DORA) and the NIS 2 Directive. Both aim to enhance cybersecurity but target different sectors and have distinct objectives and requirements.