Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Security Measures to be Taken While Developing a Mobile Application

Today, mobile apps have become an integral part of our lives. So, ensuring adequate security measures are taken while developing them is important. App security is not a feature or a bonus but a basic requirement. Having inadequate security measures in place can prove to be disastrous, and one security breach can cost a business a lifetime of trust and millions of dollars. Critical security measures must be taken to ensure data security and privacy when developing mobile apps.

Salesforce Becomes the Latest Platform to Unwittingly Aid Phishing Scammers

Cybercriminals used the legitimacy of Salesforce’s email gateway to bypass security scanners and target Meta customers in an effort to steal Facebook credentials. One of the initial challenges any phishing attack has is to make it past security measures designed to scan and identify malicious emails. One such way is to misuse a legitimate well-known platform’s outbound sending of emails.

What is a Code Signing within the Public Key Infrastructure (PKI)?

Public Key Infrastructure (PKI) is a fundamental backbone, empowering the seamless use of cutting-edge technologies like digital signatures and encryption across vast user populations. It encompasses a comprehensive suite of hardware, software, policies, processes, and procedures, working harmoniously to create, manage, distribute, use, store, and revoke digital certificates and public keys.

The rise of AI in software development

Generative artificial intelligence tools are changing the world and the software development landscape significantly. Our webinar series will help you understand how. The popular press continues to reverberate with stories about the miracles of generative artificial intelligence (GAI) and machine learning (ML), and all the ways it might be used for good—and for bad. There’s hardly a tech company that isn’t talking about how GAI/ML can enhance its offerings.

Detect Code Leaks On Public GitHub With GitGuardian Honeytoken

When your private code becomes publicly visible, you want to know about it immediately. GitGuardian Honeytoken is a quick and easy way to add leakage detection to your repositories. Get a detailed email informing you that your honeytoken has been publicly exposed. GitGuardian Honeytoken gives you the timestamp, IP address, and user agent of who triggered it, as well as what action they were trying to take.

The 443 Podcast - Episode 254 - BlackHat 2023 Recap

In this special end-of-week episode of The 443, we cover some of our favorite talks from this year's edition of the BlackHat cybersecurity conference in Las Vegas. We'll discuss the trends we saw and summaries of interesting topics including AI, nation state warfare, and improving cyber defense. You can view more information on the CISA guidance as well as Blaze Lab's full blog post at the links below.

Weekly Cybersecurity Recap August 11

New companies are hurt by significant data breaches every week, especially in the United States. This week insurance companies were the big target. Prudential, Progressive, and a range of insurance providers that work with PH Tech were all hit by data breaches. Allegheny County, Pennsylvania, and the Colorado Department of Higher Education were also victims of their own data breaches. Millions of individuals were exposed to potential data losses between these different breaches.

Managing Internal Dependencies with Black Duck: New Custom Component Capability | Synopsys

Discover the latest capabilities in Black Duck for efficient custom component management and handling internal dependencies. This video provides insights into the automatic identification of new custom components within Black Duck, enhancing its existing capabilities for open source and internal dependency management. Learn how to navigate… unknown components create custom components and seamlessly integrate them into your projects.