Recent Security News

  • Hacker Conversations: Chris Wysopal, AKA Weld Pond

    November 14, 2023 at 08:09AM Chris Wysopal, founder and CTO of Veracode, discusses his background as a hacker and the ethical hacker’s role in cybersecurity. He explains that hackers have a curiosity to understand how systems work and can uncover unintended consequences. Wysopal also discusses the dual use dilemma of hacking tools like L0phtCrack and…

    Read More

  • Google Suing Cybercriminals Who Delivered Malware via Fake Bard Downloads

    November 14, 2023 at 08:09AM Google is taking legal action against cybercriminals who used websites to deliver malware under the guise of offering downloads for its chat-based AI tool, Bard. The malicious sites allowed hackers to gain control of victims’ social media accounts. Google is seeking an order to halt these scams and disable related…

    Read More

  • Webinar Today: Using Governance and Privilege to Gain Control Over Third-Party Access

    November 14, 2023 at 08:09AM Summary: Join SecurityWeek and Saviynt for a live webinar on November 14 at 1PM ET to learn how to build trust in third-party relationships by implementing secure processes and tools. Topics covered include creating a secure Day-1 process, reducing risk through just-in-time access provisioning, and utilizing PAM processes to monitor…

    Read More

  • Top 10 API Security Threats for Q3 2023

    November 14, 2023 at 08:09AM The Q3 ‘API Threatstats’ report reveals two main findings: API vulnerabilities are growing rapidly, necessitating a new compilation of the top ten API security threats. Wallarm’s report delves into different vulnerability categories with real-life examples, emphasizing their new approach to threat listing. They present the Top 10 API threats in…

    Read More

  • The Importance of Continuous Security Monitoring for a Robust Cybersecurity Strategy

    November 14, 2023 at 07:33AM The global average cost of a data breach in 2023 was $4.45 million, leading organizations to realize that traditional cybersecurity measures may not be enough. Continuous monitoring, which involves actively searching for vulnerabilities and threats, is seen as a key strategy. For web applications, a pen testing as a service…

    Read More