Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Second quarter blocked DDoS attack volumes were up more than 40% compared to the same period in 2020, a Radware report reveals. The report provides an overview of DDoS attack trends by industry, as well as across applications and attack types. Notable … Continue reading Blocked DDoS attack volumes up, tech, healthcare and finance most targeted

Industrial facilities progressively at risk of data theft and ransomware attacks

Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial Control Systems are incredibly challenging to secure, leaving plenty of gaps in pro… Continue reading Industrial facilities progressively at risk of data theft and ransomware attacks

Top Vulnerability Management Tips that Can Simplify Cybersecurity

The post Top Vulnerability Management Tips that Can Simplify Cybersecurity appeared first on Digital Defense, Inc..
The post Top Vulnerability Management Tips that Can Simplify Cybersecurity appeared first on Security Boulevard.
Continue reading Top Vulnerability Management Tips that Can Simplify Cybersecurity

The basics of security code review

With staffing ratios often more than 200 developers for every AppSec professional, scaling security requires increasing the developer’s engagement in securing the product. To do that, developers must be responsible for the security of the code they wri… Continue reading The basics of security code review

Is it OK to publish PoC exploits for vulnerabilities and patches?

In the wake of the Microsoft Exchange ProxyLogon zero-day and F5 BIG-IP security exploits earlier this year, many are questioning if and when should researchers publish proof of concepts for vulnerabilities and associated patches. Hafnium hackers were … Continue reading Is it OK to publish PoC exploits for vulnerabilities and patches?

Kubestriker: A security auditing tool for Kubernetes clusters

Kubestriker is an open-source, platform-agnostic tool for identifying security misconfigurations in Kubernetes clusters. It performs a variety of checks on a range of services and open ports on the Kubernetes platform, helps safeguard against potential… Continue reading Kubestriker: A security auditing tool for Kubernetes clusters

Consumers embracing biometrics to protect their information

Consumers across the U.S. and Canada have embraced digital banking and biometric identity proofing during the COVID-19 pandemic, a FICO study has found. The study found that 41 percent of North American consumers are more likely to use digital means to… Continue reading Consumers embracing biometrics to protect their information

Product showcase: Accurics

It is no big secret that infrastructure has changed over the last decade. We went from tools such as autossh, to configuration management, and ended up with Infrastructure as Code (IaC) concepts. We came a long way from racking servers and spinning up … Continue reading Product showcase: Accurics

When it comes to vulnerability triage, ditch CVSS and prioritize exploitability

When it comes to software security, one of the biggest challenges facing developers today is information overload. Thanks in part to the widespread proliferation and use of open-source code (a study by Red Hat showed that 36% of software in use at surv… Continue reading When it comes to vulnerability triage, ditch CVSS and prioritize exploitability