Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OWASP Top 10:2021 - A02 Cryptographic Failures

Cryptographic failures refer to the improper use, implementation, or management of cryptographic systems. These issues often result in unauthorized exposure of sensitive data like passwords, credit card numbers, or personal records. In the OWASP Top 10 – 2021, this category replaced the broader ‘sensitive data exposure’ from the 2017 list, with a sharper focus on the misuse or failure of cryptographic mechanisms.

Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari

Today, SquareX released new threat research on an advanced Browser-in-the-Middle (BitM) attack targeting Safari users. As highlighted by Mandiant, adversaries have been increasingly using BitM attacks to steal credentials and gain unauthorized access to enterprise SaaS apps. BitM attacks work by using a remote browser to trick victims into interacting with an attacker-controlled browser via a pop-up window in the victim's browser.

Understanding the Risks of Remote Monitoring and Management Tools

The IT environment is evolving. Organizations have embraced hybrid work models, expanded their operations and personnel footprints, and digitalized their processes and capabilities. And those in charge of these now sprawling environments must deal with the increasingly complicated task of keeping endpoints, users, and more both operational and secure.

What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?

The OWASP Top 10 is a security research project that outlines the ten most critical security risks to web applications. Published by the Open Worldwide Application Security Project (OWASP), it serves as a widely recognized benchmark for web application security. The list is compiled from data gathered by security experts and organizations worldwide, based on the prevalence, detectability, and impact of various vulnerabilities.

Europe Launches EUVD: A Step Toward Cybersecurity Resilience and Strategic Autonomy

The recent launch of the European Union Vulnerability Database (EUVD) by the European Union Agency for Cybersecurity (ENISA) marks an important moment in the region’s approach to software vulnerability management. Made operational as part of the EU’s obligations under the NIS2 Directive, the EUVD joins a small but critical group of global vulnerability databases – until now led almost exclusively by the US-based Common Vulnerabilities and Exposures (CVE) programme.

Welcome-to-The New Era of AI-Driven Development

Artificial intelligence is no longer a future consideration. It’s here — and it’s changing how software is built. Fast. Enterprise teams are moving beyond AI pilots and proof-of-concepts. They’re rolling out real-world, high-value use cases and doing it at scale. According to IDC forecasting, AI spend will more than double by 2028. At the center of that surge is AI-assisted software development.

AI Is Reshaping Software. Is Your Security Strategy Keeping Up?

Software development is undergoing its biggest shift since the rise of cloud and DevOps. The difference this time? The shift is being driven by artificial intelligence, and it’s moving fast. AI-powered coding tools have rapidly made their way into developer workflows. Agents and LLMs are helping teams move faster, automate more, and build in entirely new ways. But speed often comes with tradeoffs.

How to Choose the Right Exposure Assessment Platform in 2025

Security teams know they need a better way to manage vulnerabilities. What they don’t always know is where to start. That’s where Exposure Assessment Platforms (EAPs) shine—some are even designed to cut through noise, eliminate manual workflows, and prioritize what truly matters. Effective EAPs consolidate findings from across your tools, triage them intelligently, and route them to the right teams for remediation. The promise is huge.

Welcome to Snyk Labs: Charting the Course for AI-Native Security

Software development is in the midst of a monumental shift, powered by the rapid advancements in Artificial Intelligence. AI isn't just changing how we build software; it's transforming the very nature of applications themselves. As AI-native applications become more prevalent, we're also seeing new, complex security threats emerge. Traditional security approaches aren’t designed for the dynamic and often unpredictable nature of Large Language Models (LLMs), agents, and other AI-driven systems.

Outpost24 Named an Overall Leader in 2025 KuppingerCole Leadership Compass Report for Attack Surface Management

Recognition Solidifies Outpost24’s Leadership in Attack Surface Management PHILADELPHIA (May 27, 2025) — Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced it has been recognized as an Overall Leader in the 2025 KuppingerCole Leadership Compass Report for Attack Surface Management and is the only European vendor named as an Overall Leader in the report. The company was also named a leader in the Product and Market categories.