Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

*nix libX11: Uncovering and exploiting a 35-year-old vulnerability - Part 2 of 2

The JFrog Security research team has recently discovered two security vulnerabilities in X.Org libX11, the widely popular graphics library – CVE-2023-43786 and CVE-2023-43787 (with a high NVD severity CVSS 7.8). These vulnerabilities cause a denial-of-service and remote code execution. X11’s latest versions contain fixes for these vulnerabilities.

Akira Ransomware-as-a-Service (RaaS) targeting Swedish organizations

Recent ransomware attacks on European organizations have attracted significant attention, primarily due to the involvement of threat actors with Russian connections or origins. Of particular concern is the latest attack on an IT service provider, which has had a profound impact on Swedish companies, government agencies, and municipalities.

Five Ways to Improve Microsoft Security and Productivity with Egnyte

Many organizations have made the decision to use Microsoft products. Their users appreciate the integrated applications provided by M365 and have grown comfortable with them over years of use. However, many administrators find Microsoft products unnecessarily complex to configure and maintain. In addition, some security and governance capabilities are either difficult to configure or simply don’t exist with Microsoft.

Why Identity Security Requires More Than ITDR

Identity Threat Detection and Response (ITDR) is one of many aspects of an effective identity security program. Yet despite what some detection and response-focused vendors may argue, ITDR is not a silver-bullet solution to prevent identity-centric attacks. Such a thing doesn’t exist. In fact, modern data breaches, industry analyst perspectives and compliance requirements make it crystal clear that organizations need more than ITDR to build an identity security program.

Safeguarding Data in the Digital Era

Each year, the National Cybersecurity Alliance celebrates Data Privacy Week to emphasize the importance of safeguarding personal data. As companies continue to focus on their organization’s digital transformation, it enables them to collect more personal information about individuals that use their services. Let’s face it, your online activity including apps on your phone are collecting an endless amount of data about you.

In 2024, we'll see escalating threats from the software supply chain

Today’s modern supply chains can be large and complex, involving many suppliers doing many different things. As digital transformation initiatives have accelerated, the ecosystem of suppliers has exploded. Effectively securing the supply chain is hard because vulnerabilities can be inherent, or introduced and exploited, at any point in the supply chain. Unfortunately, a compromised software supply chain can cause significant damage and disruption.

How Transparency Can Stop Invoice Fraud

The average cost of invoice fraud to middle-market businesses is almost $280,000 per year. Invoice fraud affects businesses of all sizes, and the levels of fraud have increased in part because it’s not possible to authenticate all invoices that come in manually, with many businesses paying out invoices without authentication if they’re under a certain amount. Today’s information security rules and regulations can’t keep up.