
Synopsys Cybersecurity Research Center
-

Comments by: Lotem Finkelstein, Director, Threat Intelligence and Research for Check Point Software Technologies I cannot overstate the seriousness of this threat. On the face of it, this is aimed at crypto miners but we believe this creates just the sort of background noise that serious threat actors will try to exploit in order to…
-

Comments by: Tim Mackey, Principal Security Strategist, at Synopsys Cybersecurity Research Centre (CyRC) Traditionally, cybersecurity incidents have involved direct attacks between malicious actors and their victims. The Threat Landscape for Supply Chain Attacks report highlights an important shift in cybercriminals’ tactics – indirectly targeting the their victims through the software of their trusted third-party suppliers and service…
-

Comments by: Tim Mackey, Principal Security Strategist at Synopsys Cybersecurity Research Center (CyRC) Each year the IBM Cost of a Data Breach report provides a wealth of insights into the business impact of a data breach. This year, what caught my eye was the increase in the length of time it took to identify and…
-

By the Synopsys Cybersecurity Research Center (CyRC) API Security Group (Travis Biehn, John Tapp, and Jamie Boote) All applications use APIs (calls to the kernel, software development kits, cryptographic libraries, and SOAP, to name a few examples) — they’re nothing new. What vendors call “API security” today refers to a subset of those APIs —…

You must be logged in to post a comment.