
Synopsys Software Integrity Group
-

Comments by: Ashutosh Rana, Senior Security Consultant, Synopsys Software Integrity Group Hearing about new malware variants for popular operating systems like Mac or Windows, as well as malware-as-a-service should not be surprising to anyone. This variant (and most other malware) depends on social engineering techniques to infect the host machine. Despite a lot of technical…
-

Comments by: Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group As details about the single largest ransomware attack continue to emerge, questions will be asked. Will the ransom be paid? Can organisations recover their data? What kind of damage will this cause? The only question that matters is: how can a problem like this…
-

Comments by: Tim Mackey, Principal Security Strategist, Synopsys Software Integrity Group From a user’s perspective, there is no difference between a data breach where company servers were hacked and someone misusing an API to obtain their data. Data loss is data loss, and attackers will find the simplest way to obtain the data they need…
-

Comments by: Ian Hall, Manager, Client Success, APAC, Synopsys Software Integrity Group News source: The Straits Times Businesses nowadays are interconnected like never before and that includes their IT systems and in this case payment card systems. It is probably too early to say where exactly the problem originated from and whether it involves the…
-

Comments by: Jonathan Knudsen, Senior Security Strategist, at Synopsys Software Integrity Group Microsoft has a proud history of leading the industry in application security, ever since Bill Gates’ famous Trustworthy Computing email nearly twenty years ago. So what does it mean for the rest of us when a security researcher like Evan Grant finds a…
-

Comments by: Lotem Finkelstein, Head of Threat Intelligence at Check Point Software Technologies This is the second time this month that the world is experiencing major internet outage, and yet again its a leading Content Delivery Network (CDN) provider behind it. Today an issue in Akamai’s Distributed Denial of Service (DDoS) mitigation platform, Prolexic caused…
-

Comments by: Jonathan Knudsen, Senior Security Strategist, at Synopsys Software Integrity Group Message brokers are software applications that serve as a messaging hub for complex systems. They provide reliable communication channels between different components, serving as the nerve center of a complex system. As such, message brokers can also be a central point of failure.…
-

Comments by: Jamie Boote, Senior Security Consultant, at Synopsys Software Integrity Group Ransomware attacks against critical infrastructure represents a shift in attacker tactics that requires a shift in priorities. Previously, industries that prioritised uptime and availability to support their operations weren’t as harmed by data loss and breaches as long as their pipelines kept pumping and…
-

Comments by: Tim Mackey, Principal Security Strategist, Synopsys Software Integrity Group With the prevalence of misconfigured databases, it’s clear that some teams lack the ability to confirm they are using a secure configuration for their production systems. There are a number of potential remedies, but one of the simplest is to define an exception based update…
-

Comments by: Aviran Hazum, Manager of Mobile Research at Check Point Software Technologies Most of the apps we took a look at are still exposing the data now. Data gathering, especially by a malicious actor, is very serious. Ultimately, victims become vulnerable to many different attack vectors, such as impersonations, identify theft, phishing and service…

You must be logged in to post a comment.