Applications

5 Trends in Patch Management for 2022

The profile of patch management has risen considerably in the last year due to the number of major breaches that have taken place where basic patches had been overlooked. News stories repeatedly note ...

Open Source Sabotage Incident Hits Software Supply Chain

An astonishing incident in recent days highlights the risks of widespread dependence on open source software – while also highlighting the free labor corporations benefit from by using open source sof...

SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts

Cyberthreats against software supply chains moved to the forefront of cybersecurity concerns a year ago when revelations of the attack on software maker SolarWinds emerged. Now one security researc...

Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat

Cybercriminals are quickly ramping up efforts to exploit the critical flaw found in the widely used Log4j open-source logging tool, targeting everything from cryptomining to data theft to botnets that...

‘Trojan Source’ a Threat to All Source Code, Languages

Researchers have outlined a method that could be used by bad actors to push vulnerabilities into source code that are invisible to human code reviewers. In a paper released this week, two researche...

Microsoft Makes Exchange Server Patches Less Optional

Microsoft Exchange is a frequent target of hackers, and often the attack vector is a well known vulnerability that a company just hasn't gotten around to patching. To try to deal with that problem,...

OWASP Names a New Top Vulnerability for First Time in Years

OWASP security researchers have updated the organization's list of the ten most dangerous vulnerabilities – and the list has a new number one threat for the first time since 2007. The last update w...

Microsoft Expands Passwordless Sign-on to All Accounts

Microsoft for the past few years has been among the loudest vendors calling for a security future that doesn’t include passwords. In 2018, the software giant took the step of doing away with passwords...

Whitelisting vs. Blacklisting: Which Is Better?

Cyberattacks are becoming more sophisticated all the time. From phishing scams to ransomware and botnets, it’s hard to keep up with the latest methods that cybercriminals use. It's not just about s...

Top Code Debugging and Code Security Tools

There's a lot of code in the world, and a lot more is created every day. The browser you're reading this article on is likely supported by millions of lines of code. And as even a casual reader would ...

Latest articles