Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Researchers Find Cyberattack Discrepancies Based on Race, Gender
An international study of cyberattacks has discovered discrepancies based on race and gender. The research by Malwarebytes, Digitunity and the...
NSA, CISA Release VPN Security Guidance
In a bid to address security risks associated with the use of virtual private network solutions, the National Security Agency and the Cybersecurity...
3.8 Billion Facebook, Clubhouse User Records Up for Sale
According to the CyberNews research team, 3.8 billion allegedly scraped and merged Facebook and Clubhouse user records have been put on sale online...
New Twist on DDoS Technique Poses Threat to CSP Networks
No Internet-connected device appears to be safe from potentially being abused by a newly theorized form of distributed denial of service attack that...
The High Cost of Using Free Threat Modeling Tools – Part 1
NOTE: This is part one of a three part series on making the business case for using commercial threat modeling tools. Anyone that’s been around the...
3.8 Billion Users’ Combined Clubhouse, Facebook Data Up for Sale
On its own, the database of 3.8 billion phone numbers leaked from social-media platform Clubhouse didn’t have much value on the underground market. In...
Consumer Cyber Stress Requires Focus on Security
Consumers are feeling stressed out about cybersecurity, but many aren’t taking measures to better educate themselves or even check their accounts for...
Execs Need Less Talk, More Action on Software Security
As the software industry struggles to recover from a supply chain security crisis, a study from Venafi indicates industry executives are saying the...
Shadow Code Remains a High Security Risk
PerimeterX released “Shadow Code: The Hidden Risk to Your Website,” the third annual survey conducted with Osterman Research on the use of Shadow...