With Insight Partners as majority owner, Detectify plans to combine application security and attack surface management capabilities. Insight's purchase supports a renewed focus on R&D and engagement with application security professionals in the U.S. and Northern Europe, Detectify’s core markets.
Unencrypted cookies tied to a suite of secure gateway technology from F5 are gateways for hackers to reach internal devices on corporate networks, warns the Cybersecurity and Infrastructure Security Agency. BIG-IP uses persistent cookies as a traffic load-balancing convenience.
Now patched vulnerabilities in online services from carmaker Kia allowed attackers to remotely control vehicle functions using only a license plate number, putting millions of cars at risk. The flaws were present in the South Korean automaker's official website for owners and in its iOS app.
With ransomware attacks on the rise, it’s more critical than ever for IT and security leaders to stay ahead of evolving threats. In this exclusive executive briefing, real-world ransomware data will be explored, providing strategic insights to help fortify your defenses. Experts who have handled thousands of...
Picus Security has received $45 million in funding led by Riverwood Capital. The investment will accelerate product development in exposure management, including attack surface management and automated pen testing. The company plans to expand further in the Americas, targeting key growth areas.
Navigating the cybersecurity maelstrom. CISOs have faced several challenges recently, including adapting to a global pandemic and the shift to widespread remote working amid significant employee turnover. Thanks to hybrid working as standard and the growing reliance on cloud technology, the attack surface has never...
CEO Yevgeny Dibrov discusses the acquisition of Silk Security and CTCI to enhance the company’s cyber risk prioritization and threat hunting capabilities. He explains why these acquisitions are crucial for addressing customer challenges and expanding Armis’ cybersecurity platform.
Rapid7's acquisition of Noetic Cyber aims to deliver improved attack surface management by offering comprehensive visibility into internal and external assets. The deal will aid security outcomes and operational efficiency for clients while helping them anticipate risks and manage them efficiently.
The booming cyber insurance market is a reaction to the explosion of cyberattacks and data breaches in the last few years. In 2021, attacks increased 50%, much more than businesses or insurers expected or budgeted for.
Given that most cyber incidents involve compromised credentials, it’s no wonder insurance...
Attackers are increasingly targeting cybersecurity devices deployed on the network edge to pivot into enterprise environments, as they take advantage of a surge in zero-day and known vulnerabilities in such devices, which organizations can take months to patch.
Security researchers have discovered another major vulnerability in Ivanti's widely used endpoint management system that can allow hackers to gain remote access for multiple devices at the same time. This comes just months after the company patched a separate SQL injection flaw in the same product.
Growing cloud adoption has forever changed the attack surface and risk
environment. What does this mean for attack surface management?
A new opportunity for continuous monitoring and automated tools, said
Andrew Scott of Palo Alto Networks. He shares new strategies for attack
surface management.
In this video...
Cybersecurity researchers say an experiment in developing a fake, malicious extension for Microsoft's Visual Studio Code, the world's most popular integrated development environment, succeeded beyond their wildest expectations. VSCode doesn't manage permissions or visibility, the researchers said.
NetSPI acquired startup Hubble to bolster its attack surface management capabilities, promising a consolidated offering for both internal and external visibility within four months. The transaction aims to drive significant cross-selling opportunities and operational efficiencies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.