Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Press Release

Outpost24 CORE delivers complete visibility of technology assets and threat exposure, with business-level mitigation guidance

Leading cyber risk platform provider Outpost24 announces release of Outpost24 CORE, a ground-breaking unified exposure management solution that gives unprecedented visibility and real-time insights into an organization's IT asset inventory and their threat exposure across the entire attack surface.

Code Intelligence Finds New Vulnerability in protobufjs: CVE-2023-36665

As part of Code Intelligence's ongoing efforts to improve the security of open-source software it continuously tests open-source projects with its JavaScript fuzzing engine, Jazzer.js, in Google's OSS-Fuzz. Recently Code Intelligence uncovered a new Prototype Pollution vulnerability in protobufjs (CVE-2023-36665) using its newly integrated Prototype Pollution bug detector. The vulnerability puts affected applications at risks of remote code execution and denial of service attacks.

Rezilion Report Finds World's Most Popular Generative AI Projects Present High Security Risk

Rezilion announces a new report, "Expl[AI]ning the Risk: Exploring the Large Language Models (LLM) Open-Source Security Landscape," finding that the world's most-popular generative artificial intelligence (AI) projects present a high security risk to organizations.
Featured Post

Exploiting ancient vulnerabilities: How did the 3CX supply chain attack occur and what can we learn from it?

On March 29th, North-Korean linked threat-actors targeted 3CX, a VoIP IPX developer, exploiting a 10-year-old vulnerability (CVE-2013-3900) that made executables appear to be legitimately signed by Microsoft when, in fact, they were being used to distribute malware. The 3CX attack is just the latest in a series of high-profile supply chain attacks over the past year. The SolarWinds attack compromised the Orion system, affecting thousands of organizations, and the Kaseya VSA attack that was used to deliver REvil ransomware also to thousands of organizations and is considered one of the largest security breaches of the 21st century.

TrustCloud Launches TrustHQ for Atlassian, upgrading Jira to become the central hub for all GRC activities

TrustHQ™ for Atlassian creates, syncs and prioritizes tasks from TrustCloud with tickets in Jira, so employees can complete and track their GRC workflows without leaving Jira, and companies can build a culture of trust.

Rezilion Launches Breakthrough Agentless Runtime Monitoring Solution for Vulnerability Management

Rezilion announces the release of its Agentless Runtime Monitoring solution. This new capability allows user connection and access to Rezilion's full feature functionality across multiple cloud platforms. It enables security teams to monitor exploitable attack surfaces in runtime without using an agent to simultaneously minimize security and operational risk.