Checkmarx Acquires Custodela to Bring Enhanced Automation to DevSecOps Programs!

Checkmarx Blog

NFCdrip: Data Exfiltration Research in Near Field Communication

NFCdrip: Data Exfiltration Research in Near Field Communication

Near-field communication (NFC) is a set of protocols that enables two electronic devices to establish communication by bringing them very close together. Usually the devices must be within less than 4cm. Contactless payment systems use NFC devices, including smartphones, and are similar to those used in credit cards and electronic ticket smartcards. Social networking and

Read More ›

Get Freebies by Abusing the Android InApp Billing API

Get Freebies by Abusing the Android InApp Billing API

Security researchers started talking about vulnerabilities in the Android InApp Billing API years ago, but we found it worthwhile to take another look to see how it has improved (or not) and verify the best way to build security into the application. The Android InApp Billing API is a powerful part of the Android framework that allows

Read More ›

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details. Unfortunately, some of the more common ways we might

Read More ›

AppSec Is Dead But Software Security is Alive & Well

AppSec Is Dead, but Software Security Is Alive & Well

Everyone agrees that an enterprise’s application ecosystem must be protected, especially when data breaches are reported with alarming frequency and the average total cost of a breach comes in at $3.62 million. However, defeating increasingly severe threats requires a holistic approach to security, one that places an emphasis on managing not only application vulnerabilities but all

Read More ›

Smart Bulb Offers Light, Color, Music, and... Data Exfiltration?

Smart Bulb Offers Light, Color, Music, and… Data Exfiltration?

Smart bulbs are widely known as a successful offering in home automation and IoT products, as they are internet-capable light bulbs that allow home users to customize the colors, schedule on and off times, and control them remotely. Some even play music and could improve your sleep. Any device that can wireless connect with phone

Read More ›

Navigation Apps: Leading the Way? Or Following You?

Navigation Apps: Leading the Way? Or Following You?

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already built into the car, these navigation tools are taking us to the grocery store, to our grandparents’ house, to job interviews, and everywhere

Read More ›

Cyber Security Workshop: Stronger Together

Cyber Security Workshop: Stronger Together

Last week at Checkmarx we hosted an official delegation from Thüringen, Germany for a Cyber Security workshop organized by Checkmarx, AHK Israel, and LEG Thüringen, the State Development Corporation, under the theme “Stronger Together.” The workshop was designed to serve as a knowledge exchange platform between all participating parties from Israel and Germany, at all

Read More ›

How can you get more from your AppSec education program

How Can You Get More from Your AppSec Education Program?

Forbes recently published an article titled “The Cybersecurity Talent Gap Is An Industry Crisis” – and without question, there’s a real lack of cybersecurity talent. Cybersecurity Ventures predicts about 3.5 million unfilled cybersecurity job openings by 2021! The need for cybersec talent is undeniable. According to Gemalto, data breaches compromised 4.5 billion records in just

Read More ›

Managing Software Security 10 Essential Best Practices [Infographic]

Managing Software Security: 10 Essential Best Practices [Infographic]

Is your software security program up to the challenges of a rapidly accelerating software delivery environment? Most aren’t – and it’s challenging to both identify the problems and determine the best ways to manage software security in a DevOps environment. Learn some of the essential best practices for managing software security now. Educate Your Team

Read More ›

(More) Common Security Mistakes when Developing Swift Apps - Part II

(More) Common Security Mistakes when Developing Swift Apps – Part II

In my post last week I shared common security mistakes developers make when building Swift applications – covering insecure data storage, symmetric key algorithms, insecure communication and more. If you haven’t read it, please take a few minutes to review this information. It’s critical to understand these mistakes as well as the ones I’m sharing

Read More ›

Jump to Category