Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a runtime solution that is proactive, effective, and frictionless. Oligo found […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Log4j Showed Us That Public Disclosure Still Helps Attackers.

Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25 pm on the 9th of December an infamous (now deleted) tweet linking a 0-day […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Log4j Showed Us That Public Disclosure Still Helps Attackers.

Mitigating Risk from Insider Threats in 2022

By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Mitigating Risk from Insider Threats in 2022

How To Effectively Secure Connected Devices

By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on How To Effectively Secure Connected Devices

New evolving Abcbot DDoS botnet targets Linux systems

Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. Researchers from Qihoo 360’s Netlab security team have spotted a new botnet, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on New evolving Abcbot DDoS botnet targets Linux systems

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Trojan Source attack method allows hiding flaws in source code

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X