Announcing ThreatX Labs
I’m happy to announce that ThreatX will be conducting more threat research with the formation of...
VIEW MOREThreatX Response to Spring4Shell
On March 29, 2022, Spring disclosed a zero-day vulnerability – Spring4Shell. A widely used Java...
VIEW MOREResponse to Threat of Russian Cyberattacks
Russia’s invasion of Ukraine is expected to lead to security attacks against Ukraine and its...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MORECyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MORERansomware Prevention: Beyond Phishing Awareness
As ransomware attackers seek ever-increasing payouts, they naturally want to maximize their spread...
VIEW MOREWhy Security Teams Need to Virtual Patch
We live in a world where new application security vulnerabilities are discovered daily....
VIEW MOREAttacks Against IoT Devices Through APIs & How to Prevent Them
You would never leave the keys to your building lying around, so why do so many organizations...
VIEW MOREKey Points for Building and Connecting Security-Friendly APIs
Application Programming Interfaces (APIs) are growing at an unprecedented rate. According to...
VIEW MORE3 Hurdles Security Will Need to Clear to Succeed in a DevOps World
Historically, there has been no love lost between software developers and security teams. Dev teams...
VIEW MOREUsing & Protecting Microservices – A Double-Edged Sword
Microservices and containers are a hot topic right now – and for various reasons. They are...
VIEW MOREBinary Decisions vs Active Interrogation
Overview A Web Application Firewall (WAF) can be a very effective security control to protect your...
VIEW MORE