In The News

Necessity is the mother of the ‘Rugged DevOps’ movement
June 30, 2016 | By Alexandra Weber Morales

No matter how good your perimeter security is, experts agree: Your system has been breached, whether you know it or not. The costs of security flaws—cybersecurity expert Joe Franscella calls... Read More >

June 2016: The month in hacks and breaches
June 30, 2016 | By CSO Staff

News hit over Memorial Day weekend of a massive breach of the social network Myspace. Usernames and passwords of 360 past and present users were stolen. This may end up being the largest data breach of all time, according to Sophos researchers. At mid-month, the GoToMyPC hack reminded us that... Read More > finds 45M leaked VerticalScope user records
June 15, 2016 | By Doug Olenick

The outdoor and sports-centric website aggregator VerticalScope was hacked according to an industry watchdog with about 45 million records from more than 1,100 websites being taken and posted to the internet. The compromised data was found by Leakedsource in February 2016 with the records discovered containing information such as email address, username,... Read More >

45 Million Potentially Impacted by VerticalScope Hack
June 15, 2016 | By SecurityWeek News

VerticalScope, which hosts 1,100 websites and forums, was hacked earlier this year, with the details of around 45 million users later leaked online. Some of the most popular online communities hosted by VerticalScope include,,, and, all of which were impacted by data leak. Apparently, the data... Read More >

The Beginners Guide To Application Security, AKA The Beginners Guide To Hacking
June 9, 2016 | By Ben Campbell

For software developers who quite understandably detest hackers, it probably doesn’t seem natural or appealing to think like a hacker in order to build better applications. But does the FBI... Read More >

Millions of Twitter Credentials Up for Sale for Less Than a Cent Each
June 9, 2016 | By Tara Seals

A hacker, who has links to the recent MySpace, LinkedIn and Tumblr data breaches, is claiming another trophy: Millions upon millions of Twitter accounts. The Russian hacker, going by the... Read More >

Press Releases

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.