A recently spotted hacking group with a penchant for using open-source tools has been using a less-than-novel tactic: exploiting SQL injection flaws. So warn researchers who recently detected attacks by the group, which has the codename GambleForce and appears to focus on gambling and retail firms.
The Cybersecurity and Infrastructure Security Agency released an advisory Wednesday warning that a Russian military intelligence unit has been actively exploiting a widely used software product since September as part of an effort to gain long-term access to compromised systems.
In the latest "Proof of Concept," Chris Hughes, co-founder and CISO of Aquia, join editors at ISMG to discuss the nuances around software liability, how organizations are integrating standards development practices, and guidelines for determining when a supplier qualifies for safe harbor.
Open-source software is pervasive in healthcare. It is used in critical systems such as electronic health records and components contained in medical devices. Federal regulators are urging healthcare sector firms to be vigilant in managing risks and threats involving open-source software.
Enterprises have struggled to strike a balance between speed and security and stability, said Sean D. Mack, author, speaker and former CIO and CISO at Wiley. DevSecOps is the superpower that resolves this long-standing conflict and allows organizations to deliver software faster and more securely.
In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.
In today's data-driven world, organizations rely on a multitude of applications to drive business operations and deliver exceptional user experiences. However, managing and controlling application usage can be a daunting task. App Control is a comprehensive tactic that empowers organizations to take control of their...
How can generative artificial intelligence be adapted to automatically find and fix software vulnerabilities in critical code? Finding answers to that question is one of the "exciting prospects" tied to the AI Cyber Challenge recently announced by the White House, said NCC Group's Chris Anley.
The financial services industry is a prime target for cyberattacks due to its access to sensitive data and financial resources. As digital transformation accelerates, financial institutions face an expanded attack surface and increasingly sophisticated threats. To effectively manage security risks and comply with...
As the world witnesses explosive growth in APIs, security teams find themselves in a race against time. APIs, the key to accelerating product delivery and enhancing customer experiences, also pose a formidable challenge for security leaders. In the digital landscape, data breaches and leaks through APIs have made...
In the dynamic realm of web applications and APIs, safeguarding them from the clutches of bad bots, DDoS assaults, code injection, and vulnerabilities is a paramount mission for organizations. But what happens when you need to build robust security fortresses with a tight budget and a team that's growing at a snail's...
ASPM was introduced to help organizations consolidate and optimize their AppSec programs. But with dozens of vendors embracing the term, and approaching the problem in a multitude of ways, there’s a lot of confusion about what to look for in an enterprise ASPM solution.
ASPM solutions are designed to deliver...
A software supply chain security startup led by a longtime Google Cloud engineer closed a Series B round to help protect more open-source software. Seattle-area Chainguard said it can secure approximately 80% of the open-source software existing customers run in their enterprise today.
Finding a SIEM that's easy, scalable, affordable, and detects threats in real-time is complex with all the jargon out there, so we are making it easy for you.
We'll show you how to ditch your legacy SIEM and upgrade to a modern SIEM that provides real-time visibility from day one and start detecting your first...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.