Salesforce breach let hackers steal Google customer data
Monday, August 25, 2025 by Richard Harris
In June, one of Google’s corporate Salesforce instances was affected by activity consistent with the UNC6040 campaign described in the post. Google responded by conducting an impact analysis and implementing mitigation steps. The affected instance stored contact information and related notes for small and medium-sized businesses. Investigators confirmed that data ...
Network API revenue to exceed 8 billion by 2030
Wednesday, August 20, 2025 by Austin Harris
A new study from Juniper Research, the foremost experts in telecommunications and connectivity markets, has found operator revenue from network Application Programming Interfaces (APIs) globally will exceed $8 billion by 2030. This is a substantial increase from the $284 million operators are forecasted to generate in 2025; with Juniper Research identifying KYC as key t...
ChatGPT agents bridging research and action
Tuesday, August 12, 2025 by Austin Harris
You can now ask ChatGPT to handle requests like “look at my calendar and brief me on upcoming client meetings based on recent news,” “plan and buy ingredients to make Japanese breakfast for four,” and “analyze three competitors and create a slide deck.” ChatGPT will intelligently navigate websites, filter results, prompt you to log in...
KNP ransomware attack
Wednesday, August 6, 2025 by Russ Scritchfield
One of the UK's oldest transport companies, KNP Logistics Group, collapsed under the weight of a ransomware attack that began with a single guessed password. The company, founded in 1865 and known primarily through its “Knights of Old” fleet, had survived world wars, economic upheavals, and generational shifts in the freight industry. But it could not su...
iOS fitness app Fitify exposes 138K user private photos
Friday, July 25, 2025 by Austin Harris
Fitify’s publicly accessible Google cloud storage bucket has exposed hundreds of thousands of files. Some of the files were user-uploaded progress pictures that individuals upload to track their body changes over time. After Cybernews contacted the company, the unprotected instance was closed.
iOS fitness app Fitify exposes 138K user private photos: Key takeawa...
McDonalds AI Hiring Bot Breach
Thursday, July 17, 2025 by Russ Scritchfield
Security researchers uncovered a critical vulnerability in McDonald’s AI-powered hiring system, McHire, revealing how a simple password flaw could have exposed applicant data, but importantly, no candidate information was leaked or made publicly available, and only five records were briefly accessed by researchers who responsibly reported the issue.
In a supers...
Red Hat Device Edge deployed to space station
Thursday, March 13, 2025 by Richard Harris
Red Hat, Inc. and Axiom Space, will collaborate on Axiom Space’s Data Center Unit-1 (AxDCU-1), targeted to launch in spring 2025 to the International Space Station. Powered by Red Hat Device Edge, the data processing prototype will conduct tests on the space station and demonstrate initial Orbital Data Center (ODC) capabilities.
The prototype will te...
Mobile operators in France unite to protect digital identities
Monday, December 16, 2024 by Brittany Hainzinger
As part of the global GSMA Open Gateway initiative, France's four leading mobile operators – Bouygues Telecom, Free, Orange and SFR – announced they will join forces to provide services designed to help app developers and enterprises tackle online fraud and protect the digital identities of mobile customers.
Mobile operators in France unite to protect digit...
Emerging features to consider for mobile app development
Wednesday, November 13, 2024 by Richard Harris
In an era where mobile applications are ubiquitous, with a staggering 8.93 million apps vying for attention across various app stores, distinguishing your app from the competition is paramount. While aesthetics undoubtedly play a role in user attraction, it is the functionality and features of an app that truly captivate and retain users. Whether you are embarking on yo...
Vulnerabilities in Apple products alert
Monday, September 30, 2024 by Richard Harris
CERT-In has recently issued Advisory CIAD-2024-0046, highlighting multiple high-severity vulnerabilities in Apple products. The vulnerabilities affect a wide range of Apple software, including iOS versions prior to 18, iPadOS versions prior to 18, macOS Sonoma versions prior to 14.7, macOS Ventura versions prior to 13.7, and the upcoming macOS Sequoia versions prior to ...
PayPal Developer Day registration opens
Thursday, August 15, 2024 by Austin Harris
PayPal is set to host its Developer Day for Fastlane on August 20-21, 2024, at its headquarters in San Jose, CA. This event will offer a comprehensive overview of integrating Fastlane with PayPal Complete Payments (PPCP) and Braintree. Attendees will benefit from technical sessions covering REST APIs, JavaScript SDKs, and GraphQL APIs, along with hands-on coding labs an...
RadQuest web3 gamified onboarding platform lands from Radix
Thursday, August 8, 2024 by Brittany Hainzinger
Radix launches RadQuest, a fully mobile-ready Web3 gamified onboarding platform designed to enable anyone to easily and confidently use Web3 and DeFi on Radix. RadQuest is the latest milestone in Radix’s Breakout2024, a year of initiatives designed to build momentum in the ecosystem.
Built-in collaboration with leading digital product studio ustwo, developers o...
AWS App Studio lands from Amazon
Friday, August 2, 2024 by Richard Harris
At AWS Summit New York, Amazon Web Services, Inc. (AWS), announced the release of AWS App Studio, a generative artificial intelligence (AI)-powered service that uses natural language to create enterprise-grade applications. A user simply describes the application they want, what they want it to do, and the data sources they want to integrate with, and in just minut...
Social engineering takeover attacks are on the rise
Thursday, April 18, 2024 by Brittany Hainzinger
OpenSSF and the OpenJS Foundation (home to JavaScript projects used by billions of websites worldwide) are alerting open-source project maintainers of social engineering takeover attacks, following new attack attempts they’ve witnessed similar to the XZ Utils incident.
The OpenJS Cross Project Council received suspicious emails, imploring OpenJS to update one o...
Verizon API portal brings 5G network to developers
Monday, February 19, 2024 by Richard Harris
Verizon network Application Programming Interfaces (APIs), which enable the developer community to access network services and capabilities, will be accessible to developers globally through various API aggregators, hyperscalers, and through Verizon’s own API portal. The incorporation of Verizon network services available through APIs into applications allow enter...
Face authentication for vehicles unveiled at MWC 24 by trinamiX
Friday, February 2, 2024 by Richard Harris
Visitors to the Mobile World Congress can find out more about trinamiX’s sensing solutions for consumer electronics and automotive and experience them up close at booth E68 in hall 6 from February 26th to 29th. trinamiX GmbH is bringing its Face Authentication with liveness detection for smartphones and vehicles to Barcelona. The company will also showcase its Con...
AI cybersecurity impacts according to NetLib Security
Monday, December 18, 2023 by Richard Harris
This is an easy call to make: NetLib Security predicts that Artificial Intelligence - Generative AI - will continue to heavily impact the world of cybersecurity, upping the game for defensive players, while giving cybercriminals more tools on the offensive side.
2023 was a year in which AI seemed suddenly to be everywhere. Although AI is not a new field, ChatGPT and ...
API security risks report exposes Netflix and Wordpress
Monday, November 27, 2023 by Richard Harris
Wallarm, the end-to-end API and app security company, announced the release of its Q3-2023 Wallarm API ThreatStats report. The quarterly report details the surge in threats centered around APIs and uncovers critical vulnerabilities, like injections and API data leaks, that have recently impacted leading firms, including Netflix, VMware, and SAP.
The new report i...
Oxeye discovers vulnerability in HashiCorp Vault Project
Tuesday, April 25, 2023 by Austin Harris
Oxeye announced the discovery of a new vulnerability in the HashiCorp Vault Project that has now been patched. HashiCorp Vault is a popular identity-based secret and encryption management system used to control access to API encryption keys, passwords, and certificates. The vulnerability was automatically discovered and reported by the Oxeye Platform during a deployment...
Identity will hold the keys to the kingdom for cybercriminals
Wednesday, February 8, 2023 by Brittany Hainzinger
In 2023, identity will continue to hold the keys to the kingdom for cybercriminals. This is a continuation from 2022, with the Verizon Data Breach Investigations Report (DBIR) attributing 80% of basic web application attacks to the use of stolen credentials like passwords. Security incidents usually involve a variety of techniques, from social engineering to supply chai...
Speed up your Java development with kits from Vaadin
Monday, October 24, 2022 by Richard Harris
Vaadin announced the release of four Acceleration Kits designed to make it faster and easier to build and modernize Java applications for enterprise use. These new Acceleration Kits speed the integration of custom applications built with Vaadin Flow into enterprise authentication, observability, and Kubernetes environments. Vaadin Flow is a unique framework that le...
VMware Tanzu portfolio updates
Tuesday, July 26, 2022 by Austin Harris
VMware has announced multiple Tanzu portfolio updates to enhance the developer experience with the general availability of Tanzu Application Platform version 1.2 and Tanzu Mission Control Cluster Configuration. With these two updates, VMware is delivering solutions to help developers succeed without hampering innovation and agility.
VMware Tanzu portfolio updates
...
Zaxbys automates hiring process with Landed app
Monday, May 2, 2022 by Austin Harris
Landed, which provides the first end-to-end recruitment engine for the restaurant and hospitality industries, announced that multiple Zaxby's franchisees are now using the Landed app to automate and accelerate hiring for new store openings and existing stores.
Multiple Zaxby’s franchisees now using the Landed app to automate and accelerate hiring
One suc...
Change Data Capture adapter launches
Tuesday, March 29, 2022 by Brittany Hainzinger
Push Technology has announced the launch of a new Change Data Capture (CDC) Adapter. The adapter is particularly appropriate for event-driven use cases in IoT transportation data, global equity/derivative exchange market data, and retail and eCommerce.
The Diffusion Platform-Gateway has an array of adapters to capture all forms of data feeds, the latest addition to i...
Testing App for API calls lands from Speedscale
Wednesday, January 19, 2022 by Brittany Hainzinger
Speedscale, the API test-automation software company, today launches Speedscale CLI, a free observability tool that inspects detects, and maps API calls on local applications or containers. The offering underscores the importance of continued and proactive API testing to quickly detect and debug defects within a shifting array of upstream and downstream interdependencie...
Security compliance predictions for 2022
Tuesday, January 18, 2022 by Austin Harris
Edward Tuorinsky is the Managing Principal of DTS, a Service-Disabled Veteran-Owned Small Business, that provides information technology and management consulting services in the areas of program management, governance, strategic planning, organization advancement, business process efficiency, software development, system integration, and learning enhancement solutions....
Future of AI in 2022
Friday, January 7, 2022 by Austin Harris
With the tech industry already facing a talent gap before the pandemic, companies have only doubled down on efforts to boost tech talent. In fact, 61% of HR professionals reported that finding qualified developers would present their biggest recruitment challenge of 2021. As we round the corner to 2022, what does it mean for developers and computer science professi...
Cloud and cyber asset management trends for 2022
Thursday, January 6, 2022 by Richard Harris
Companies have been racing to mature their technologies and pursue digital transformations in the last few years, as a way to gain or maintain competitive advantage and resilience. This has led to an emerging area of focus: cyber asset management. Organizations are now taking inventory of their IT infrastructure and prioritizing more agile cyber asset management process...
Matthew Halliday predicts 2022
Wednesday, January 5, 2022 by Brittany Hainzinger
Matthew Halliday, Executive Vice President, Product Strategy and Co-Founder at Incorta is a veteran software engineer and data analytics expert, he co-founded Incorta in 2013 after more than 15 years at Oracle and several years managing products at Microsoft. With over 20 years of experience developing products and taking them to market, Matthew has served in several ke...
Mitigating API attacks in 2022
Wednesday, January 5, 2022 by Richard Harris
Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...
Artificial Intelligence authentication in 2022
Tuesday, January 4, 2022 by Brittany Hainzinger
Sanjay Gupta, Global Head of Product, at Mitek shares his 2022 predictions on the rise of touchless technologies, the impacts of digital banking, and the increasing use of voice and behavioral biometrics to verify identification.
Touchless technology will gain adoption in new industries
Technology designed to reduce friction in consumer behavior and improve t...
Neural decision processor launches from Syntiant
Wednesday, October 6, 2021 by Brittany Hainzinger
Syntiant Corp has introduced the Syntiant NDP200 Neural Decision Processor (NDP), the company's first chip designed for vision processing that can provide highly accurate inference at under 1mW.
NDP200 neural decision processor from Syntiant
Packaged with the Syntiant Core 2, the NDP200 can ...
Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
Amazon location service launches
Monday, August 23, 2021 by Austin Harris
Amazon Web Services, Inc. announced the general availability of Amazon Location Service, a new service that makes it easier and more cost-effective for customers to add location functionality to their applications without compromising on user privacy or data security. With Amazon Location Service, customers can embed location functionality in their applications usi...
Cloudentity selects customer identity and access management leader
Tuesday, June 22, 2021 by Brittany Hainzinger
Cloudentity has selected customer identity and access management (CIAM) leader Simeio as a delivery partner to accelerate its flexible and scalable solutions for authorization governance automation. Supporting strict Open Banking compliance standards, as well as PSD2, Cloudentity has more than doubled its year-over-year sales growth and has...