Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Priorities from the OpenSSF Secure Open Source Software Summit 2023

Snyk has been a long-time active participant in and sponsor of the Open Source Security Foundation (OpenSSF). We’re there because we believe in supporting its mission of securing the open source ecosystem. A recent summit meeting convened by the OpenSSF with the White House brought together various US Government departments for a chat about open source security.

All Cloudflare Customers Protected from Atlassian Confluence CVE-2023-22515

On 2023-10-04 at 13:00 UTC, Atlassian released details of the zero-day vulnerability described as “Privilege Escalation Vulnerability in Confluence Data Center and Server” (CVE-2023-22515), a zero-day vulnerability impacting Confluence Server and Data Center products. Cloudflare was warned about the vulnerability before the advisory was published and worked with Atlassian to proactively apply protective WAF rules for all customers.

NSA & CISA joint advisory for Web Application Access Control Abuse

The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), U.S. Cybersecurity and Infrastructure Security Agency (CISA), and U.S. National Security Agency (NSA) released a joint Cybersecurity Advisory to warn vendors, designers, and developers of web applications and organizations using web applications about Insecure Direct Object Reference (IDOR) vulnerabilities.

Jit is live on AWS! Sneak peek Episode 2 - 19-09-2023

Our CTO, David Melamed, was a rockstar on session two of Jit live with AWS, which streamed on the AWS Twitch channel. David discussed ‘Protecting a Modern App - elevating security by integration in your CI/CD pipeline'. Here is a short recap from the one-hour session highlighting some of the key insights and takeaways from the talk.

A New World: The Cloud and Statistical Computing

A New World: The Cloud and Statistical Computing For biotechs, statistical computing has traditionally required complex on-premises infrastructure. Configuring servers and storage for data science became cumbersome and fluctuating project needs made scaling a headache. An immediate solution was needed, especially considering the complex needs of biostatisticians and data scientists alike. Enter The Cloud Enter the cloud revolution.

Generative AI and the Automation of Social Engineering Increasingly Used By Threat Actors

Threat actors continue to use generative AI tools to craft convincing social engineering attacks, according to Glory Kaburu at Cryptopolitan. “In the past, poorly worded or grammatically incorrect emails were often telltale signs of phishing attempts,” Kaburu writes. “Cybersecurity awareness training emphasized identifying such anomalies to thwart potential threats. However, the emergence of ChatGPT has changed the game.

AI Development Tools that Security Teams Should Know About and How to Secure Them

Following the rush to Artificial Intelligence (AI), many companies have introduced new tools and services to the software supply chain. Some of today’s most popular AI development tools include: This assortment of tools can be used to develop a wide range of AI applications, such as chatbots, virtual assistants, and image recognition systems.

90+ Artificial Intelligence statistics you need to know in 2023

Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries, societies, and the way we live and work. The profound impact of AI is evident in virtually every facet of our lives, from personalized recommendations on streaming platforms to the automation of complex tasks in many industries. Join us on this data-driven journey to unravel the multifaceted world of AI and explore the numbers that underpin its significance in our rapidly evolving digital era.