Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JFrog's security scanners discovered thousands of publicly exposed API tokens - and they're active! The Full Report

Note: This report was previously published in InfoWorld When developing the recently announced JFrog Advanced Security, our Research team decided to try out its new “Secrets Detection” feature. Our goal was to test our vulnerability detection on as much real world data as possible, to make sure we eliminate false positives and catch any bugs in our code.

Why KYC is an effective tool against Digital Fraud in Money Services Businesses (MSB)

MSB services have come to the rescue of many, who can’t access banks immediately and want to transfer money or carry out trade exchanges. So, it surely provides time and place convenience. We all know MSB services include cash acceptance for a transaction or currency exchange, global remittance services, check cashing outlets, and facilitating payments between payer and provider without the performing KYC verification.

Defending Against Cloud Security Threats: Breaking Down Initial Access Techniques

As organizations continue to move their business operations into the cloud, the expanded attack surface generated by the “digital transformation” continues to present new opportunities for threat actors. Luckily, strategies to mitigate these new risks do exist and, as always, these center around the techniques and tactics of the adversaries.

Q3 2022 Threat Landscape: Insider Threat, The Trojan Horse of 2022

In Q3 2022, Kroll saw insider threat peak to its highest quarterly level to date, accounting for nearly 35% of all unauthorized access threat incidents. Kroll also observed a number of malware infections via USB this quarter, potentially pointing to wider external factors that may encourage insider threat, such as an increasingly fluid labor market and economic turbulence.

Prepare, respond & recover: Battling complex Cybersecurity threats with fundamentals

The cybersecurity industry has seen a lot of recent trends. For example, the proliferation of multifactor authentication (MFA) to fight against credential harvesting is a common thread. Threat actors have been creating legitimate-looking phishing campaigns, which have been a big driver for this trend. Although some of the tools for MFA can be complex, proper authentication/authorization is an absolute fundamental that every enterprise should embrace.

Top 10 Law Enforcement Operations Against Cyber Crime in 2022

Since the start of 2022, multiple law enforcement agencies worldwide have been taking action targeting organized cyber crime activity, including cyber criminals behind phishing and BEC scams, dark web forums, or malware distribution. Here’s Top 10 of the most notable law enforcement ops against cyber crime carried out in the past ten months.

Supply chain integrity, transparency and trust is now firmly on the agenda

Supply chain risk continues to make headlines, from Solarwinds and Kaseya to last week’s announcement of a patch for the OpenSSL vulnerability, and the latest cybersecurity review from the U.K.’s National Cyber Security Centre highlights the serious threats posed by supply chain attacks.

Secure Coding in C and C++ Using Fuzz Testing

Today, I would like to show you to a simplified fuzz testing approach that enables secure coding of C and C++ applications. If you read this article to the end, you will learn about an automated security testing approach for C/C++ that can protect your applications against all sorts of memory corruptions and other common C/C++ vulnerabilities.