Breaking News



The discussion surrounding which is superior – binary or source code scanning – has plagued the static analysis market since its inception. A source code scanner analyzes un-compiled code, whereas a binary scanner analyzes compiled code, but in the end, the result is the same. They are simply two engineering solutions for the same problem. However, as a fundamental part of vendors’ approaches ...


Source: Veracode.com

Mar 07, 2018
The complexities of developing secure software aren't lost on anyone in the business world. One tool development teams have used to adapt to today's challenging environment is software containers, which allow applications to run reliably on different platforms and systems.   Today, organizations use containers to address a wide range of development and testing tasks. What's more, as DevOps and...


Source: Kaspersky (securelist.com)

Mar 05, 2018
UPDATED March 5th, 15.00 Last year we published a story revealing the rise of miners across the globe. At the time we had discovered botnets earning millions of USD. We knew this was just the beginning of the story, which turned out to develop rapidly. Together with the rest of the world, we have been watching the hike in cryptocurrency, for example, the price of Bitcoin and Altcoins continuous...

Intel Skylake die shot. (credit: Intel) Windows users running the latest version of Windows 10 on recent Intel processors will soon be receiving Intel's microcode updates to address the Spectre variant 2 attack. Earlier this year, attacks that exploit the processor's speculative execution were published with the names Meltdown and Spectre, prompting a reaction from hardware and software comp...


Source: Kaspersky (securelist.com)

Feb 28, 2018
In 2017, we saw a number of changes to the world of financial threats and new actors emerging. As we have previously noted, fraud attacks in financial services have become increasingly account-centric. User data is a key enabler for large-scale fraud attacks, and frequent data breaches – among other successful attack types – have provided cybercriminals with valuable sources of personal informa...

Our economy is almost entirely digitized. Modern businesses rely on software to run their day-to-day operations, and, as such, innovation must meet the demands of an ever-evolving market. However, business leaders are at a crossroads when it comes to securing their digital assets. As organizations migrate towards development practices like DevOps, the need to produce software faster becomes as...


Source: Kaspersky (securelist.com)

Feb 27, 2018
There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t be too many IoT investigations. So, we have continued our experiments into checking and uncovering how vulnerable they are, and followed up our research focusing on smart home devices. Researchers have al...


Source: Veracode.com

Feb 27, 2018
March 1, 2018 marks the end of the one-year transition period for the New York Department of Financial Services (NYDFS) cybersecurity regulation. The passage of this date means affected organizations — including banks, insurance companies, and other financial services companies licensed by or operating in New York State — must be in compliance with a raft of security rules intended to protect ...