News Wrap: Linux Utility Backdoor, Steam Zero Day Disclosure Drama

From a backdoor placed in the Webmin utility to vulnerability disclosure drama around zero-days in Valve’s Steam gaming clients, Threatpost breaks down this week’s top stories. Continue reading News Wrap: Linux Utility Backdoor, Steam Zero Day Disclosure Drama

Automate Software Security Checks to Find Open Source Software, SDK Perils

The reusability and convenient utility of open source software (OSS) and software development kits (SDKs) has been a boon to mobile application developers. Both types of software shortcuts help developers save time and money and accelerate development… Continue reading Automate Software Security Checks to Find Open Source Software, SDK Perils

How to Protect WordPress Websites from SQL Injection

If you are one of the many who are using WordPress as a content management system (CMS) for your website, it’s important to be aware of SQL injection threats that could take down your business. SQL injection is a common threat, as SQL is the mos… Continue reading How to Protect WordPress Websites from SQL Injection

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

The post What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? appeared first on Security Intelligence.

Continue reading What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

5 Steps to Integrate SAST Tools with DevSecOps

Static application security testing, or SAST, is the process to test the source code to find any security defect in the code or its vulnerabilities. In the application security assurance program, SAST is performed to identify and remove all security v… Continue reading 5 Steps to Integrate SAST Tools with DevSecOps

What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising?

Malvertising is one more threat that will keep your IT decision-makers up at night, but any company with a protection-first mindset should be able to remain ahead of the curve.

The post What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising? appeared first on Security Intelligence.

Continue reading What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising?

How to Defend Against Malvertising Drive-By Attacks

Malvertising — malware delivered by internet advertisements — can infect your computer even if you don’t click on it. But there are steps you can take to protect yourself now.

The post How to Defend Against Malvertising Drive-By Attacks appeared first on Security Intelligence.

Continue reading How to Defend Against Malvertising Drive-By Attacks