Introducing Checkmarx Software Composition Analysis (CxSCA)

Checkmarx Newsroom

In The News

Why websites are so vulnerable to hackers
May 31, 2016 | By Ben Dickson

Hackers just can’t get enough of hacking websites. Malicious actors break into them to upload infected copies of operating systems or distribute malware. Fraudsters use website vulnerabilities to steal sensitive credentials and financial info. The feds take them over to track down child porn consumers. Hacktivists take them down to... Read More >

Update: 117 million LinkedIn email credentials found for sale on the dark web
May 26, 2016 | By Doug Olenick

The 2012 LinkedIn data breach may be the breach that just keeps on giving with the news that 117 million customer email credentials originating from that hack were found for... Read More >

By the numbers: Cyber attack costs compared
May 24, 2016 | By CSO Staff

Data breaches caused by malicious insiders and malicious code can take as long 50 days or more to fix, according to Ponemon Institute's 2015 Cost of Cyber Crime Study. While malware, viruses, worms, trojans, and botnets take only an estimated 2-5 days to fix. Unsurprisingly, attacks by malicious insiders are... Read More >

Crowdsource your security knowledge: A simple guide to OWASP Top 10
May 20, 2016 | By Debbie Fletcher

Over the past two years, the Internet has seen some of the biggest, most devastating data breaches in history. With each attack, millions of personal identifiable information records are stolen,... Read More >

Hacker looks to sell 117M LinkedIn passwords from 2012 data breach
May 19, 2016 | By James Rogers

LinkedIn says that it is moving quickly to deal with the release of data from a 2012 security breach, which could include 117 million passwords. A hacker is reportedly looking... Read More >

Tools, skills and budgets can help developers fight rise in Web app cyber attacks
May 18, 2016

Checkmarx announced that three recent reports highlight the challenge faced by developers in securing code as attacks against web applications increase, while security budgets for developers remain low. As highlighted... Read More >

Press Releases