Learn best practices about how to avoid API Vulnerabilities from security experts at WhiteHat Security.
I’ve written about the recent Equifax, Sonic and Whole Foods breaches already, but am following up here to challenge anyone reading this: HAVE YOU TAKEN ACTION TO PROTECT YOURSELF YET?
We have learned today that the Equifax breach that has affected hundreds of millions of people was exploited by utilizing a known issue in Apache Struts 2, specifically CVE-2017-5638.
The news broke yesterday that Equifax had a massive breach that leaked personal information including Social Security Numbers, names and Drivers License numbers. The scope of this breach is staggering: 143 million records.
Every time someone comes to me for career advice, or asks where I think they should look for their next big opportunity, I say – “Consider a career in cybersecurity.” It is a huge field with a broad spectrum of job opportunities.
In this article, I’m going to help you interpret how the different parts of this cybersecurity regulation touch on AppSec – that is, your websites, your mobile applications, your internal payment systems and networked third-party services.
Leverage the TCO Calculator to better assess the ROI of your Application Security program.
The CopyCat malware exploits some known vulnerabilities in older versions of Android which allows an attacker to root the victim’s phone. It then can install applications and will hijack ads from your phone, effectively paying the attacker each time an ad pops up.
Applications are literally at the core of our digital lives, so it’s more important than ever to ensure that enterprises of all types can provide safe digital experiences. We hope this report provides valuable insights and recommendations on how to secure the apps that drive your business.