Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A CISO's View on Building an API Security Program in 2025

As we enter the new year, the API security landscape continues to evolve. The volume and complexity of APIs attacks has increased. CISOs and security teams should evaluate their current tools and programs for changes. In this webinar, we bring together CISOs to discuss what changes and threats should be considered in API security programs for the new year. Together, we’ll examine and discuss.

Understanding OSS security, quality, and license risks in Black Duck SCA | Black Duck

In this video, we unveil the three fundamental views of Software Composition Analysis (SCA) risk within Black Duck: Security, License, and Operational. Join us as we navigate the landscape of open source components to identify vulnerabilities, license obligations, and component health.

Simplifying Backup and Recovery for VMware Tanzu Kubernetes with CloudCasa

In the modern Kubernetes ecosystem, VMware Tanzu has emerged as a popular platform for enterprises deploying containerized workloads. To meet Tanzu Backup and disaster recovery needs, Tanzu relies on Velero, an open-source solution, for backing up and restoring cluster resources and persistent volumes.

Phishing Campaign Abuses Legitimate Services to Send PayPal Requests

A phishing campaign is abusing Microsoft 365 test domains to send legitimate payment requests from PayPal, according to Fortinet’s CISO Dr. Carl Windsor. Windsor found that the threat actor registered a free MS365 test domain and used it to create a distribution list containing targets’ email addresses. The scammer then used this distribution list to send payment requests via PayPal’s web portal.

Malicious WordPress Plugin Assists in Phishing Attacks

Researchers at SlashNext warn that cybercriminals are using a WordPress plugin called “PhishWP” to spoof payment pages and steal financial information. The spoofed pages are designed to steal payment card numbers, expiration dates, CVVs, and billing addresses. The plugin can also intercept one-time passwords generated to secure the transactions. The stolen data is immediately sent to the crooks via Telegram as soon as the victim hits “enter” on the phishing page.

Securing the Future: DevSecOps in Action

How can you ensure your software supply chain is resilient and ready for the challenges of tomorrow? In this exclusive session, we delved into the practical lessons of 2024 and showcased how JFrog is leading the charge in securing DevOps pipelines. In this engaging conversation between industry experts, we uncovered real-world insights, explored actionable strategies, and demonstrated innovations that safeguard your software delivery lifecycle.

Secure AI Agent Development: Trends and Challenges

In the rapidly evolving landscape of artificial intelligence (AI), the development of AI Agents has become a focal point for enterprises… nearly all of them. According to recent IBM research, 99% of respondents are exploring or actively developing AI agents. This surge in interest also serves to underscore the necessity for secure AI agent development.

The HIPAA to HISAA transformation

The healthcare industry stands at the cusp of a major transformation with the introduction of the Healthcare Information Security Accountability Act (HISAA), a progressive regulatory framework set to replace the decades-old Health Insurance Portability and Accountability Act (HIPAA). HISAA is designed to address the evolving complexities of healthcare data management, emphasizing real-time data governance, proactive monitoring, and stricter controls over third-party data exchanges.

Zombie APIs: The Undead Threat to Your Security

Zombie APIs, sometimes called “orphaned” or “forgotten” APIs, refer to endpoints that were initially deployed for a specific purpose but are no longer actively used or maintained. These APIs are often left operational within an organization’s infrastructure due to oversight or incomplete decommissioning processes.

CVE-2025-0282: Critical Zero-Day Remote Code Execution Vulnerability Impacts Several Ivanti Products

On January 8, 2025, Ivanti published a security advisory announcing the patching of a critical, actively exploited vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. Tracked as CVE-2025-0282, the vulnerability allows remote unauthenticated threat actors to achieve remote code execution (RCE) via a stack-based buffer overflow flaw. Ivanti confirmed that exploitation has only been observed in Connect Secure, and no exploitation has been reported in Policy Secure or ZTA Gateways.