app-security
Why SMB Security Needs Efficient Device Management
SMBs are increasingly becoming the cyberattacker’s goldmine. Device management is one way to stay ahead of malicious actors and protect your crown data jewels ...
Security Boulevard
Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert
Wajahat Raja | | android, app-security, Cybersecurity News, Dirty Stream Attack, file overwrite, Google Guidance, Google Play Store, Microsoft Threat Intelligence, Mobile Security, patch management, responsible disclosure, Security Exploits, Vulnerabilities, WPS Office, Xiaomi
In the digital realm, security is paramount, especially when it comes to the applications we use daily. Recently, concerns have surfaced regarding vulnerabilities in popular Android applications available on the Google Play ...
March | Traceable AI Feature Release
Stay current with new developments from Traceable AI; including, local hosting for EU/Asia and support for agentless deployments. The post March | Traceable AI Feature Release appeared first on Traceable App & ...
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework The post Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework appeared first on Traceable App & ...
February | Traceable AI Feature Release
Stay current with new developments from Traceable AI; including, new support for AWS Lambda serverless architecture and new privacy features for managing sensitive data. The post February | Traceable AI Feature Release ...
How Do Mass Assignment Vulnerabilities Impact My Business?
By the end of the post, you'll understand what mass assignment is and how it leads to a vulnerability. We'll also look at some examples and understand its impact on business. The ...
January Software Release – Kicking off the New Year
It’s January and we kicking off the new year with a new set of features aimed at improving application security for our customers. Traceable AI has released a range of new features ...
Observability, AI And Context: Protecting APIs From Today’s (And Tomorrow’s) Attacks
Security and IT teams need to tackle this problem in a structured process that takes into account API application security best practices and procedures that constantly evaluate an organization's APIs. The post Observability, ...
Instant Log4j protection. Shield and hunt with Traceable AI
A look at the challenges teams face with mitigating Log4j vulnerabilities (i.e. Log4Shell) and how Traceable AI closes those gaps. The post Instant Log4j protection. Shield and hunt with Traceable AI appeared ...
Instant Log4j protection. Shield and hunt with Traceable AI
A look at the challenges teams face with mitigating Log4j vulnerabilities (i.e. Log4Shell) and how Traceable AI closes those gaps. The post Instant Log4j protection. Shield and hunt with Traceable AI appeared ...