Applications

‘Trojan Source’ a Threat to All Source Code, Languages

Researchers have outlined a method that could be used by bad actors to push vulnerabilities into source code that are invisible to human code reviewers. In a paper released this week, two researche...

Microsoft Makes Exchange Server Patches Less Optional

Microsoft Exchange is a frequent target of hackers, and often the attack vector is a well known vulnerability that a company just hasn't gotten around to patching. To try to deal with that problem,...

OWASP Names a New Top Vulnerability for First Time in Years

OWASP security researchers have updated the organization's list of the ten most dangerous vulnerabilities – and the list has a new number one threat for the first time since 2007. The last update w...

Microsoft Expands Passwordless Sign-on to All Accounts

Microsoft for the past few years has been among the loudest vendors calling for a security future that doesn’t include passwords. In 2018, the software giant took the step of doing away with passwords...

Whitelisting vs. Blacklisting: Which Is Better?

Cyberattacks are becoming more sophisticated all the time. From phishing scams to ransomware and botnets, it’s hard to keep up with the latest methods that cybercriminals use.  It's not ju...

Top Code Debugging and Code Security Tools

There's a lot of code in the world, and a lot more is created every day. The browser you're reading this article on is likely supported by millions of lines of code. And as even a casual reader would ...

Neural Fuzzing: A Faster Way to Test Software Security

Software vulnerabilities are a grave threat to the security of computer systems. They often go undetected for years until it is too late and the consequences are irreversible. In order to find these w...

Open Source Security: A Big Problem

Open source security has been a big focus of this week's Black Hat conference, but no open source security initiative is bolder than the one proffered by the Open Source Security Foundation (OpenSSF)....

NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

Two of the largest government security agencies are laying out the key cyberthreats to Kubernetes, the popular platform for orchestrating and managing containers, and ways to harden the open-source to...

Top Microsegmentation Software for 2021

It seems that no matter how many security technologies, network perimeters, and intrusion prevention safeguards are erected, the bad guys somehow find a means of entry. Enter microsegmentation as a...

Latest articles

Best Privileged Access Ma...

MITRE Expands Security Te...

Top IoT Security Solution...

Companies Get Better at F...