cyberattacks
Find APIs Hiding in the Shadows
What’s hiding in the shadows? It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether it’s a forgotten about application, or ...
U.S.-South Korea Forge Strategic Cybersecurity Framework
The United States and South Korea have crafted a “Strategic Cybersecurity Cooperation Framework.” The framework is part of recent bilateral accords intended to signal mutual adversaries and reaffirm the “ironclad commitment to ...
Defending Your Organization Against Ransomware
Every day, coordinated cybercriminal groups are developing more advanced skills to hack organizations’ networks. The number of ransomware attacks has increased significantly, and it’s getting easier for sophisticated cybercriminal gangs to access ...
BlackBerry Report Surfaces Increasing Rate of Cyberattacks
A threat intelligence report published by BlackBerry found that from December 2022 through February 2023, 12 cyberattacks per minute were launched against organizations using the company’s cybersecurity software and services, with 1.5 ...
The Ethics of Selling Hacker Tools
With Indiana Jones about to enter the space race in the Dial of Destiny, I am reminded of the great Tom Lehrer’s 1965 song about former Nazi scientist Dr. Wernher von Braun’s ...
Noname Security Aligns With Intel on API Security
Noname Security announced today it is working with Intel to offload application programming interface (API) security to network integration cards (NICs) based on 4th-gen Intel Xeon Scalable processors and the Intel NetSec ...
Akamai Report Surfaces Spike in Attacks Against Web Apps and APIs
A report published by Akamai Technologies suggested that in addition to launching attacks against web applications, more cybercriminals are specifically looking to compromise application programming interfaces (APIs). Overall, the attacks against web ...
The Risks of Third-Party Vendors: A Gateway to Cyber-Attacks
Understanding the Vulnerabilities and Safeguarding Your Business Against Cybercriminals by using Third-Party Vendors ...
5 Ways to Reduce the Attack Surface for Microservices
Microservices is a software development approach where an application is divided into small, independent and loosely coupled services that work together to provide the application’s overall functionality. Each microservice is designed to ...
Splunk: Cybersecurity Dynamics Rapidly Changing
A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...