Vulnerabilities
Introducing Azure Repos Integration in Strobes
We’re excited to announce the integration of Azure Repos into Strobes, bringing powerful version control and code management capabilities directly into your vulnerability management workflow. Azure Repos Overview: Azure Repos... The post ...
Introducing AppSentinels Integration in Strobes
We’re excited to announce the integration of AppSentinels into Strobes, enhancing your ability to manage API level security issues effectively. AppSentinels Overview: AppSentinels is a robust solution for API security,... The post ...
Introducing Azure Boards Integration in Strobes
We’re excited to announce the integration of Azure Boards into Strobes, enhancing your project management capabilities and streamlining your vulnerability tracking processes. Azure Boards Overview: Azure Boards is a project... The post ...
CAASM: Dead-End Approach or Worthwhile Journey?
Cyber Asset Attack Surface Management (CAASM) is focused on enabling security teams to overcome asset visibility. Asset visibility is foundational to security programs — knowing what assets exist in their environment and ...
‘Netfetcher’ package drops illicit ‘node’ binary on Windows
Recently identified PyPI packages called "netfetcher" and "pyfetcher" impersonate open source libraries and target Windows users with malicious executables that have a zero detection rate among leading antivirus engines. Furthermore, some of ...
Palo Alto Networks Shines Light on Application Services Security Challenge
An analysis published by Palo Alto Networks finds a typical large organization adds or updates over 300 services every month, with those new and updated services being responsible for approximately 32% of ...
How Pen Testing is Evolving and Where it’s Headed Next
Increasing the frequency of pen testing isn’t just about preventing the next attack but creating an environment where cybersecurity is so advanced ...
Patch Tuesday not Done ’til LINUX Won’t Run?
Redmond reboot redux: “Something has gone seriously wrong.” You can say that again, Microsoft ...
The Zenbleed Vulnerability: How to Protect Your Zen 2 CPUs
The Zenbleed vulnerability exploits a flaw in the speculative execution mechanism of AMD Zen 2 CPUs. It affects the entire Zen 2 range, even extending to AMD’s EPYC data center chips. As ...
McAfee Unveils Tool to Identify Potential Deep Fakes
McAfee today added a tool to detect deep fakes to its portfolio that will initially be made available on PCs from Lenovo that are optimized to run artificial intelligence (AI) applications ...