By Dotan Nahum April 20, 2022 No one wants to send their precious information over unencrypted channels. This is why most websites and web services use HTTPS to encrypt data by default. When it comes…
Read MoreBy Mark Brindley, Head of Cloud Alliance The cloud provides the infrastructure backbone for most enterprises, as well as the delivery of mission-critical applications. In the last decade, the cloud has become scalable, flexible, reliable,…
Read MoreTo protect ourselves from cybercriminals, it is essential to use a combination of characters when creating a password, use different ones for each account, use a long password, change it regularly and use two-factor authentication.…
Read MoreSpring4Shell, Log4j and a few good tips for staying secure By Idan Sofer May 5th, 2022 Well it is now safe to say that the season of Java vulnerability exploits is upon us. In the…
Read MoreBy Alon Bar, Product Marketing Manager A bank’s applications drive the business. And as they evolve and grow, they expose more APIs causing the attack surface to grow as well. Cybercriminals are exploiting this phenomenon,…
Read More03/05/2022 Background In a joint advisory published On April 27, the Cybersecurity & Infrastructure Security Agency (CISA)- in collaboration with CSA/NSA/FBI/ACSC and other cybersecurity authorities provided details on the top 15 Common Vulnerabilities and Exposures…
Read MoreIoT is everywhere. From smart light bulbs to IP cameras, wearables, and even smart kitchen appliances, IoT provides benefits for any organization as it enables employees to be more productive and crucial business processes to…
Read MoreAccording to the UK’s National Cyber Security Centre (NCSC), ransomware is the most immediate threat to businesses worldwide. Gone are the days when ransomware actors would target a single machine and try to extort a…
Read MoreBy Dotan Nahum It is safe to say that most code in the world resides on either GitLab or GitHub. Which makes perfect sense in a cloud-based, OSS-dependent world. Without them, OSS and collaborative software…
Read MoreHighlights: Check Point Research discovered vulnerabilities in the ALAC format that could have led an attacker to remotely get access to its media and audio conversations MediaTek and Qualcomm, the two largest mobile chipset manufacturers…
Read More