cyberattacks

cyberattacks news search results

Developer news items we found relating to cyberattacks

30 results
Blockchain-voting-from-Iranians-Vote-and-Freedom-Tool

Blockchain voting from Iranians Vote and Freedom Tool


Thursday, August 22, 2024 by

Rarimo is a privacy-first, zero-knowledge (ZK), protocol unlocking a new generation of social apps. In February, Rarimo launched Freedom Tool, an open-source software for citizen-run, anonymized elections and polls, which solves the long-standing technical challenge of enabling digital identity checks while also protecting citizens from tracking.  Iranians Vote ...


AWS-introduces-Mithra-advanced-threat-intelligence-neural-network

AWS introduces Mithra advanced threat intelligence neural network


Thursday, August 15, 2024 by

In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...


DevOps-threats-report-released-from-GitProtect-io

DevOps threats report released from GitProtect io


Monday, August 12, 2024 by

Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities, and, as a result, data loss are the reality that DevSecOps teams have to face...even every few days. The State of DevOps threats report - teams affected every few days GitProtect.io recently presented its studies on the most severe incidents affecting tools like GitHub...


Secure-software-development-education-report-from-the-Linux-Foundation

Secure software development education report from the Linux Foundation


Wednesday, August 7, 2024 by

Linux Foundation Research and the Open Source Security Foundation (OpenSSF) are pleased to release a new report titled "Secure Software Development Education 2024 Survey: Understanding Current Needs." Based on a survey of nearly 400 software development professionals, the analysis explores the current state of secure software development. It underscores&n...


Microsoft-outage-caused-by-software-update-from-CrowdStrike

Microsoft outage caused by software update from CrowdStrike


Tuesday, July 23, 2024 by

On July 18, a software update released by CrowdStrike, an independent cybersecurity firm, began to affect IT systems worldwide. Although Microsoft was not directly responsible for the incident, the impact on their ecosystem prompted the company to take immediate action to support their customers. Microsoft outage caused by software update from CrowdStrike affect...


SaaS-integration-challenges-explained-by-Prismatic

SaaS integration challenges explained by Prismatic


Wednesday, July 17, 2024 by

In this Q&A, we delve into the world of SaaS integrations with the CEO and co-founder of Prismatic Michael Zuercher. He shares valuable insights on the challenges companies face when implementing integrations, including security concerns, scaling difficulties, and the impact on core product development. Michael offers guidance on mitigating security risks and evalua...


Rise-in-cyberattacks-is-alarming-folks

Rise in cyberattacks is alarming folks


Friday, June 28, 2024 by

A recent study has uncovered a startling rise in cyberattacks from 2022 to 2023. Throughout 2023, the United States experienced an alarming 3,205 data breaches, marking a dramatic 78% surge from the 1,801 incidents reported in 2022.  The study conducted by data collection experts SOAX utilized data from the Identity Theft Resource Center on the number of data vi...


Cybersecurity-performance-optimization-updates-from-Logpoint

Cybersecurity performance optimization updates from Logpoint


Friday, February 2, 2024 by

Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources. The new release delivers increased system stability and ...


Open-source-AI-trends-for-2024-according-to-Eclipse-Foundation

Open source AI trends for 2024 according to Eclipse Foundation


Thursday, December 21, 2023 by

Each year I usually like to make a few predictions about where the software industry, open source, and Eclipse Foundation projects are headed. This year is going to be a little broader, as some large trends are going to impact us in ways that should be discussed and understood. Government regulation will impact the software industry The first trend is that for the...


Digital-trust-and-security-predictions-from-DigiCert

Digital trust and security predictions from DigiCert


Tuesday, December 12, 2023 by

Mike Nelson, along with a team of experts at DigiCert looks back at the past year's security developments and makes some bold predictions of technology, identity, and digital trust. Here are DigiCert's top predictions: Prediction 1: Senior executives will become more knowledgeable about post-quantum cryptography, and companies will accelerate their investment...


SBOM-mandate-to-improve-cybersecurity-in-the-US

SBOM mandate to improve cybersecurity in the US


Friday, March 17, 2023 by

The number of cyberattacks waged against government sectors worldwide increased by 95% in the second half of 2022 compared to the same time period in 2021. (1) The global cost of cyberattacks is expected to grow exponentially from $8.44 trillion in 2022 to $23.84 trillion by 2027. (2) To support the nation’s critical infrastructure and Federal Government networks,...


Mitigating-API-attacks-in-2022

Mitigating API attacks in 2022


Wednesday, January 5, 2022 by

Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...


Oxeye-closes-a-$5.3-Million-seed-financing-round

Oxeye closes a $5.3 Million seed financing round


Thursday, November 4, 2021 by

Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...


Quantum-computing-in-2021

Quantum computing in 2021


Monday, January 11, 2021 by

Quantum computing is likely to become practical soon, with the capability to break many encryption algorithms. Organizations should plan to upgrade to TLS 1.3 and quantum-safe cryptographic ciphers soon. Big Tech vendors Google and Microsoft will make updates to web browsers, but the server-side is for your organization to review and change. Kick off a Y2 K-li...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


Package-Feed-module-released-by-Flexera

Package Feed module released by Flexera


Friday, August 16, 2019 by

Flexera, the software company that helps organizations realize technology’s power to accelerate their business, released the Package Feed Module, a new add-on module for its popular AdminStudio product. AdminStudio saves users time and money preparing applications for deployment. AdminStudio is a tool used for creating custom deployment...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


Supporting-citizen-developers-to-speed-digital-transformation

Supporting citizen developers to speed digital transformation


Thursday, May 10, 2018 by

More than just a buzz word, companies across the globe are embracing digital transformation to create more efficient organizations not tied to traditional software applications and to forgo the messy paper trail. Digital transformation is dependent on many factors, but in particular, cloud-based technology is largely responsible for fueling the change. Simply put, overt...


Why-developers-run-away-from-security-updates

Why developers run away from security updates


Monday, April 16, 2018 by

Veracode, Inc. has released new data that shines a light on the discrepancy between component security and hygiene. According to the research conducted with Vanson Bourne, only 52 percent of developers using commercial or open source components in their applications update those components when a new security vulnerability is announced. This highlights organizations’ la...


Oracle-Autonomous-Data-Warehouse-Cloud-launched-for-GA

Oracle Autonomous Data Warehouse Cloud launched for GA


Sunday, April 1, 2018 by

Oracle has announced the availability of a new service based on its Autonomous Database named Oracle Autonomous Data Warehouse Cloud. Autonomous Data Warehouse Cloud, uses machine learning to deliver performance, security capabilities, and availability with no human intervention, at "half the cost of Amazon Web Services."Autonomous Data Warehouse Cloud delivers all of t...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


Bitcoin-exchange-apps-are-risky-claims-new-report

Bitcoin exchange apps are risky claims new report


Monday, January 29, 2018 by

RiskIQ claims that the app stores are hosting 661 blacklisted Bitcoin apps which leave users open to hackers. They analyzed 18,408 apps across 20 app stores (mostly Android based),  but including Apple, Google Play, SameAPK, and APKPlz.Fabian Libeau, EMEA VP of RiskIQ, warned anybody considering downloading such software to be extremely cautious and to research eac...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


People-are-worried-about-internetconnected-car-security

People are worried about internetconnected car security


Monday, December 4, 2017 by

Thales announced survey results revealing how respondents feel about the potential risks connected vehicles pose to their safety and the security of their personal information.Connected cars use mobile internet technology for safety systems and remote diagnostics (like “OnStar”), as well as controlling key functions via a smartphone, smartwatch, tablet or computer - ena...


Investing-in-websites-instead-of-apps

Investing in websites instead of apps


Thursday, October 26, 2017 by

Since the dawn of the first iPhone, Apple has been shaping the mobile narrative to suit its interests. Apple is able to maintain its dominance over the mobile market by brainwashing much of the technology industry into thinking that businesses need to spend hundreds of thousands of dollars creating and maintaining mobile apps to reach their target audiences. In fact, up...


Flexera-issues-warning-about-Cyberattacks

Flexera issues warning about Cyberattacks


Tuesday, October 24, 2017 by

As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...


Report-Indicates-Data-Breaches-Continue-Across-Industries-in-Q2-2016

Report Indicates Data Breaches Continue Across Industries in Q2 2016


Friday, July 15, 2016 by

Edgile has released its Q2CY16 GRC (Governance, Risk and Compliance) Content report that provides regulatory updates across a range of industries and examines significant data breaches in Q2. This report information about new laws and regulations affecting them, covering PCI DSS, GLBA, HIPAA and more, to protect against cyberattacks.  The report indicates that Rans...


Prioritizing-Proactivity-in-a-Complex-IT-World

Prioritizing Proactivity in a Complex IT World


Friday, June 10, 2016 by

As a business’s technology infrastructure grows in complexity, IT teams struggle to take a proactive approach to infrastructure monitoring. Furthermore, the C-suite is placing more emphasis on IT’s responsibility to drive the business forward, adding additional pressure to the need to get ahead of performance problems or system outages before they occur. We sat dow...


Tips-to-Use-Penetration-Testing-to-Protect-Your-Business-From-Cyber-Attacks

Tips to Use Penetration Testing to Protect Your Business From Cyber Attacks


Thursday, May 12, 2016 by

Forty-seven percent of all breaches were caused by malicious or criminal attacks according to the most recent global data breach study released by the Ponemon Institute. Resolving an attack cost businesses an average of $170 per record, translating to an average total cost of $3.79 million for a data breach.Today’s cybercriminals are getting smarter at finding and breac...


Bomgar-Platform-Updates-Secures-Cloud-Users-Against-Cyberattacks

Bomgar Platform Updates Secures Cloud Users Against Cyberattacks


Monday, September 14, 2015 by

Bomgar has released the latest version of its Privileged Access Management solution, which provides security professionals with the ability to control, monitor, and manage access to critical systems by privileged users and third-party vendors. Bomgar’s approach allows companies to enable controlled system access and defend against cyberattacks without requiring com...