JavaScript security: The importance of prioritizing the client side

In this interview with Help Net Security, Vitaly Lim, CTO at Feroot, talks about the most common JavaScript threats, the devastating impact of malicious or vulnerable code, and the importance of JavaScript security in the development process. We’re hea… Continue reading JavaScript security: The importance of prioritizing the client side

Why low-code and identity must co-exist

Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, building, testing, and verifying major chunks of code usually takes months &#821… Continue reading Why low-code and identity must co-exist

Increasing security for single page applications (SPAs)

Single page applications (SPAs) have become the most popular way to create websites that feel faster for the end-user without hitting the server every time a user interacts with an application. Shifting away from the traditional cookie-based approach, … Continue reading Increasing security for single page applications (SPAs)

Solving the problem of secrets sprawling in corporate codebases

GitGuardian announced the results of its report which extends its previous edition focused on public GitHub by depicting a realistic view of the state of secrets sprawl in corporate codebases. The data reveals that on average, in 2021, a typical compan… Continue reading Solving the problem of secrets sprawling in corporate codebases

Data leaks and shadow assets greatly exposing organizations to cyberattacks

CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. The report also highlights how the market pressures of 2021 led to an increas… Continue reading Data leaks and shadow assets greatly exposing organizations to cyberattacks

Attackers used Dridex to deliver Entropy ransomware, code resemblance uncovered

Sophos released a research that details code similarities in the general purpose Dridex botnet and the little-known ransomware, Entropy. The similarities are in the software packer used to conceal the ransomware code, in the malware subroutines designe… Continue reading Attackers used Dridex to deliver Entropy ransomware, code resemblance uncovered

Software supply chain security still a pain point

ActiveState announced the results of its survey, providing insights into the security challenges of the software industry’s open source supply chain, which includes the security of open source components, as well as the security and integrity of … Continue reading Software supply chain security still a pain point

Supply chain shortages create a cybersecurity nightmare

The White House has recently issued alerts noting that many manufacturers suffer from disrupted supply chains, and rebuilding supply chains is a major priority. Some analysts are suggesting that many months, and perhaps years are likely to transpire be… Continue reading Supply chain shortages create a cybersecurity nightmare

Low code applications are essential for cybersecurity development in applications

One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as part of the automated development lifecycle, rather than relying on security or… Continue reading Low code applications are essential for cybersecurity development in applications