Applications

How to Prevent Software Supply Chain Attacks

Software supply chain attacks present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a securi...

Millions of MySQL Servers are Publicly Exposed

More than 3.6 million MySQL servers are publicly exposed on the internet, security researchers noted this week. Shadow Server Foundation researchers reported that they simply issued a MySQL c...

New Open-source Security Initiative Aimed at Supply Chain Attacks

Open source software libraries are frequent targets of hackers, who see them as an attractive path for stealing credentials and distributing malware. Hundreds of thousands of software project...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

Top SD-WAN Solutions for Enterprise Security

The development of software-defined wide area networking (SD-WAN) has given enterprise administrators flexibility akin to virtualization to manage distributed networks and users globally. Wide...

Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk

The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity. Hundreds of millions of devices use the Log4j component for various online services, amo...

Software Supply Chain: A Risky Time for Dependencies

The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surf...

Palo Alto Unveils Zero Trust 2.0, Says Current Solutions Inadequate

Palo Alto Networks says current zero trust solutions don't go far enough, so today the cybersecurity leader urged the industry to transition to what it's calling Zero Trust Network Access 2.0 (ZTNA ...

Getting Started with the Burp Suite: A Pentesting Tutorial

Burp is one of the top-rated security suites for pentesting and ethical hacking. While there are paid professional and enterprise editions, you can install the community edition for free and even use...

Security Researchers Find Nearly 400,000 Exposed Databases

Databases contain some of the most critical data in enterprises, so vulnerabilities in them are serious issues. Researchers at Singapore-based cybersecurity company Group-IB recently discovered tho...

Latest articles