Checkmarx Blog

blog-history-of-javascript

The History of JavaScript [INFOGRAPHIC]

Feb 12, 2018 By Arden Rubens | JavaScript was created by Brendan Eich, a Netscape Communications Corporation programmer, in September 1995. It took Eich only 10 days to develop the scripting language which was then known as Mocha.  
Read More »
blog-january-2018_-hacks-and-breaches

January 2018: Hacks and Breaches

Feb 01, 2018 By Arden Rubens | It’s been released that hackers stole £130bn from consumers in 2017, and that number is only predicted to rise in 2018. Hackers wasted no time and were off to a quick start in the new year, especially following their success in 2017. Let’s recap what hackers have been up to in January.
Read More »
blog-tinder

Are You on Tinder? Someone May Be Watching You Swipe

Jan 23, 2018 By Dafna Zahger | The Checkmarx Security Research Team found disturbing vulnerabilities in a highly popular dating application used by people across the globe – Tinder. The report features how a malicious attacker can take advantage of these vulnerabilities to cause serious privacy breaches to an unsuspecting user.
Read More »
blog-the-top-5-exfiltration-attacks-on-webviews

The Top 5 Exfiltration Attacks on WebViews

Jan 22, 2018 By Erez Yalon | This is part three of a three-part series. Click for part 1 and part 2. 
  WebViews are a huge advantage when it comes to portability. But at what cost?   By allowing Web content to interact with native functions, a window of attack possibilities is opened. Old versions of Android (until API 17) allowed Remote Code Execution when an attacker was able to abuse a JavaScript Interface. Although this vulnerability was fixed in recent API versions, such attacks can still be devastating. It just depends on how the JavaScript Interface is implemented.  
Read More »
blog-year-of-gdpr

The Year of GDPR

Jan 15, 2018 By Arden Rubens | Way back in 2012, the European Commission laid down initial plans for the European Union’s data protection reform. It took the relevant parties four years to reach an agreement on what would be involved and how it will be enforced. And now, here we are! As close as ever to the May deadline in the year Europe finally takes the leap to be “fit for the digital world”, and business will be changing the way which data is handled, processed, and protected with the General Data Protection Regulation (GDPR).  
Read More »
blog-owasp-resources

Top 5 OWASP Resources No Developer Should Be Without

Jan 09, 2018 By Sarah Vonnegut | Writing secure code is now a must for developers. The rising number of attacks on organizations big and small and the fallout for companies who’ve been breached are growing. As such, security is finally moving out of the periphery to become a mainstay for business continuity.  
Read More »
blog-recap_-the-biggest-data-breaches-of-2017

Recap: The Biggest Data Breaches of 2017

Dec 31, 2017 By Arden Rubens | From a Republican National Committee contractor exposing voting data on nearly 200 million people to Equifax revealing a breach impacting over 143 million people – it’s safe to say that when it comes to data breaches, 2017 has kept us on our toes. So much so that more data was lost or stolen in the first half of 2017 (1.9 billion records) than in the entire of 2016 (1.37 billion) according to research released earlier this year.  
Read More »
blog-2018-predictions-looking-ahead_-whats-in-store-for-2018_

Looking Ahead: What’s in Store for Cybersecurity in 2018?

Dec 25, 2017 By Arden Rubens | As the cybersecurity world is left reeling from record breaking hacks and breaches which occurred (or surfaced) in 2017, the importance of organizations ensuring their code’s security is rightfully taking the spotlight as the new year begins.   However, in taking a step beyond code security, it’s critical that organizations of all sizes and those employed within them are paying close attention to the rising trends impacting the cybersecurity world. Continue reading to learn more about our predictions of which cybersecurity trends will dominate in 2018.  
Read More »
blog_the-forrester-sast-wave-1

The Forrester SAST Wave: Not a True Reflection of the Market

Dec 12, 2017 By Moshe Lerner | Checkmarx leads the SAST market and displays the most significant and impressive growth in the industry. In this blog post, we demonstrate our growth and 2017 accomplishments in light of the latest Forrester Wave, which we feel fails to reflect the SAST market as it is.
Read More »
blog-smart-cities_-can-my-city-be-hacked_

Smart Cities: Can My City be Hacked?

Dec 11, 2017 By Sarah Vonnegut | Our connected devices make life easier on us as individuals, and the conveniences afforded to us by connecting technology to the physical world around us are compounded when we expand the reach from individuals to a greater population, – entire cities.   While cities have been adapting new technologies that connect the physical world to the digital world for decades, the rate at which they do so is reaching new heights, and the technologies themselves are far more advanced. These technologies, and the greater amount of connectivity they allow for, are opening cities up for the greater good…as well as the greater evil.  
Read More »

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.