Gartner® Report Hype Cycle™ for Security Operations, 2024

Gartner® Report Hype Cycle™ for Security Operations, 2024

In our groundbreaking 2023 Annual Review, Horizon3.ai delves into the transformative approach of autonomous pentesting with NodeZero. This pivotal document is your gateway to mastering proactive cybersecurity defense mechanisms. The post Gartner® ...
Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of Beta

Mythic 3.3 — Out of BetaMythic 3.3 was released in a Beta six weeks ago, and since then there has been a bunch of feedback, not just about new Mythic 3.3 features but about the ...
X users call for the arrest of Attorney General Garland

2024 US Presidential Election: Politically Motivated Threats Target Range of Stakeholders

| | Blog, research
Nisos 2024 US Presidential Election: Politically Motivated Threats Target Range of Stakeholders Thomas Matthew Crook’s attempt to assassinate former president and current presidential candidate Donald Trump during a rally in Butler, Pennsylvania, ...
News Desk 2024: Eyal Paz and Liad Cohen on Transitive Vulnerabilities

Will We Survive The Transitive Vulnerability Locusts

Understanding and Mitigating the Risks of Transitive Vulnerabilities in Application Security At OX Security, our mission is to eliminate manual AppSec processes. Our latest research, presented at Black Hat 2024, highlights a ...
How to Prepare for the Cyber Resilience Act

How to Prepare for the Cyber Resilience Act

The post How to Prepare for the Cyber Resilience Act appeared first on AI-enhanced Security Automation ...

How ASPM Solutions Help Organizations Prepare for the EU’s DORA

The European Union’s Digital Operational Resilience Act (DORA), passed in late 2022, is set to take full effect by early 2025. DORA establishes new cybersecurity standards for financial institutions operating and doing ...

Building Trustworthy AI: Contending with Data Poisoning

| | Blog, research
Nisos Building Trustworthy AI: Contending with Data Poisoning As Artificial Intelligence (AI) and Machine Learning (ML) systems are adopted and integrated globally, the threat of data poisoning attacks remains... The post Building ...
Sigstore for Python Packaging: Next Steps for Adoption - William Woodruff, Trail of Bits

Securing Artifacts: Keyless Signing with Sigstore and CI/MON

Artifact integrity is crucial in maintaining software security and trustworthiness. High-profile breaches like SolarWinds, CodeCov, 3CX, and JumpCloud have shown how altering artifact contents can lead to significant security vulnerabilities, enabling attackers ...

Ducks Now Sitting (DNS): Internet Infrastructure Insecurity

| | Blog, research
Was it DNS? It’s always DNS. In this case, DNS (Domain Name System) is filled with sitting ducks (Ducks Now Sitting) for domain name hijacking. Multiple threat actors have been exploiting this ...
Trump Campaign Crypto Scam: Unveiling the Phishing Plot

Trump Campaign Crypto Scam: Unveiling the Phishing Plot

| | Blog, research
Uncovering a phishing scam targeting Trump's supporters using crypto donations. Learn how to spot fraudulent sites and stay protected. Stay informed and vigilant. The post Trump Campaign Crypto Scam: Unveiling the Phishing ...

Application Security Check Up