How Does Deterministic Security Help Reduce False Positives?

Some organizations are reluctant to block attacks based on their security tool alerts because of the false positives being generated, in this article we take a look at how deterministic security helps to eliminate false positives.
The post How Does Det… Continue reading How Does Deterministic Security Help Reduce False Positives?

Google Report Shows Zero Day Exploits On Track to Meet or Top Last Year’s Numbers

A new report from Google is showing eleven zero-days were detected in the wild in the first half of 2020.  That puts 2020 on track to match or top last year’s total number, when Google researchers found 20 zero-day exploits
The post Google Report Shows… Continue reading Google Report Shows Zero Day Exploits On Track to Meet or Top Last Year’s Numbers

Analyzing packets of Android apps to verify secure connection [closed]

As a layman, I’d like to check whether an Android app is using the HTTPS protocol or not. As far as I know there’s no other way than analyzing the packets in a software such as Wireshark but how exactly do I do that? What exactly should I … Continue reading Analyzing packets of Android apps to verify secure connection [closed]

How to Strike Gold in the Land of Continuous Security

This is our fourth installment of a six-part series dedicated to helping CISOs establish and maintain a successful application…
The post How to Strike Gold in the Land of Continuous Security appeared first on ZeroNorth.
The post How to Strike Gold in t… Continue reading How to Strike Gold in the Land of Continuous Security

Websites Have 3.2 Critical Application Vulnerabilities on Average

According to a recent report from WhiteHat Security, the average website had 3.2 critical application vulnerabilities, a number that has remained unchanged over the last three years
The post Websites Have 3.2 Critical Application Vulnerabilities on Ave… Continue reading Websites Have 3.2 Critical Application Vulnerabilities on Average

How to Move Your Innovations Along on the Application Security Range

In our third installment of a six-part series on how CISOs can find success in the “Wild West” of application security,…
The post How to Move Your Innovations Along on the Application Security Range appeared first on ZeroNorth.
The post How to Move You… Continue reading How to Move Your Innovations Along on the Application Security Range

SQL Injection, XSS, and RCE Top List of Vulnerabilities in Internet-facing Applications

A new report on the top vulnerabilities in internet facing applications in 2020 was released recently by Edgescan, and found that 42% of the vulnerabilities found in these apps are SQL Injection vulnerabilities
The post SQL Injection, XSS, and RCE Top … Continue reading SQL Injection, XSS, and RCE Top List of Vulnerabilities in Internet-facing Applications