Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organizations are struggling with—from conventional asset inventory reporting to proactive elimination of exposed attack… Continue reading Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities

Report Reveals TeamViewer Was Breached By Chinese Hackers In 2016

The German software company behind TeamViewer, one of the most popular software in the world that allows users to access and share their desktops remotely, was reportedly compromised in 2016, the German newspaper Der Spiegel revealed today.

TeamViewer… Continue reading Report Reveals TeamViewer Was Breached By Chinese Hackers In 2016

DHS Orders Federal Agencies to Patch Critical Flaws Within 15 Days

In recent years, we have seen how hackers prey on those too lazy or ignorant to install security patches, which, if applied on time, would have prevented some devastating cyber attacks and data breaches that happened in major organisations.

The United… Continue reading DHS Orders Federal Agencies to Patch Critical Flaws Within 15 Days

Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities

Welcome back!

Adobe has today released its monthly security updates to address a total of 75 security vulnerabilities across its various products, 71 of which resides in Adobe Acrobat and Reader alone.

February 2019 patch Tuesday updates address seve… Continue reading Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities

Addressing UK Security Concerns in Huawei Products May Take 5 Years, Exec Says

Huawei’s been having a rough time recently. After the US, New Zealand and Australia prevented the telecom company from working on their 5G mobile networks for fear it would spy for the Chinese government, the European Commission expressed concern… Continue reading Addressing UK Security Concerns in Huawei Products May Take 5 Years, Exec Says

Your 2019 Essential Software Security, Development, & DevOps Conferences

“DevOps” encompasses a wide range of topics – throw security in there and you’ve added even more. This roundup includes events throughout the year and around the globe, from small events to community conferences and up. Whether … Continue reading Your 2019 Essential Software Security, Development, & DevOps Conferences

Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems

Just in time…

Some cybersecurity experts this week arguing over Twitter in favor of not using HTTPS and suggesting software developers to only rely on signature-based package verification, just because APT on Linux also does the same.

Ironically, a s… Continue reading Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems

OSS Security a Top Priority in National Cyber Strategy

The U.S. House of Representatives Committee on Energy and Commerce recently released its Cybersecurity Strategy Report, in which the committee identified several key concepts and principles to address and prevent cybersecurity incidents. “The support … Continue reading OSS Security a Top Priority in National Cyber Strategy

AppSec Is Dead, but Software Security Is Alive & Well

Everyone agrees that an enterprise’s application ecosystem must be protected, especially when data breaches are reported with alarming frequency and the average total cost of a breach comes in at $3.62 million. However, defeating increasingl… Continue reading AppSec Is Dead, but Software Security Is Alive & Well

Checkmarx Report: Tackling Software Exposure in the DevOps Cycle

Today, in an effort to better understand the evolving nature of software delivery and the role security plays, we released a new report, “Managing Software Exposure: Time to Fully Embed Security into Your Application Lifecycle,”which we com… Continue reading Checkmarx Report: Tackling Software Exposure in the DevOps Cycle