Tag : Cloud Security

Anonymous-Mask

What’s HOT in Application Security Vol #22

Jul 31, 2012 By asaphs | Game publisher Ubisoft in hot water due to serious security threat
Ubisoft is a household name synonymous with fantastic, exciting games and also with a zero tolerance approach to game piracy. The company has been plagued with problems recently after the Uplay network has been absolutely overloaded with issues; outages, technical issues and now security!

</Read More>

What’s HOT in Application Security Vol #20

Jul 16, 2012 By Administrator | Yahoo left red-faced after SQL injection vulnerability reveals nearly half a million passwords!
A hacking group who name themselves ‘DD3Ds Company’ have, within the last few days leaked 453,492 yahoo text passwords for Yahoo accounts. DD3Ds Company now claim that they attained the passwords by means of SQL injection against a poorly secured Yahoo subdomain. Security experts have named the it as Yahoo Voices.

</Read More>

What’s HOT in Application Security Vol #19

Jul 09, 2012 By Administrator | Cyber Attacks on ATM and online banking are at an all time high
Cyber Attacks which are aimed at online banking applications are at an all time high, according to several security experts. Unsurprisingly, almost one third of all attacks were aimed at banks which reside in the Gulf, where the banks are swelling with oil money and where small amounts of money missing from accounts are likely to go un-noticed.

</Read More>
Application-Security-News-Thumbnail

What’s HOT in Application Security Vol #18

Jul 02, 2012 By Administrator | What are the Top Flaws in Web Applications?
When it comes to security, web applications are consistently the most vulnerable to penetration. Here are some of the top flaws in web applications:

</Read More>
Application-Security-News-Thumbnail

What’s HOT in Application Security Vol #17

Jun 25, 2012 By Administrator | PayPal to Grant Money for Reported Vulnerabilities
Asking hackers to report security breaches they find without being rewarded doesn’t seem to work. There has to be some kind of an incentive. EBay, Amazon, Sony and now PayPal will provide security researchers who discover vulnerabilities in its website with money prizes. This encourages hackers to search for security breaches but at the same time, instead of using the vulnerabilities for illegal intentions they could make some money, disclose the vulnerabilities that they find on to their own personal blogs, and possibly make a name for themselves.

</Read More>

What’s HOT in Application Security Vol #16

Jun 18, 2012 By Administrator | WHMCS still vulnerable after latest string of attacks
WHMCS is a UK supplier of technical support and customer service is yet again the victim of a Ddos attack, due to its inability to mend an already known SQL Injection vulnerability. The embarrassment continued for the company in the days following where a hacker was auctioning the rights to abuse the weakness using an underground forum.

</Read More>
Application-Security-News-Thumbnail

What’s HOT In Application Security Vol #14

Jun 04, 2012 By Administrator | Are Chinese Hackers threatening the US economy using malware?
According to a McClatchy-Tribune report this month “Chinese attempts to collect U.S. technological and economic information will continue at a high level and will represent a growing and persistent threat to U.S. economic security.” The FBI, Department of Homeland Security and the Justice Department’s national security division have raised concerns in granting an international service license to China Mobile, making it easier for China to spy on the U.S. or steal intellectual property from U.S. companies.

</Read More>

What’s HOT in Application Security Vol#13

May 21, 2012 By Administrator | The High Price of Web Application Security 
What is the true cost of web application security? One CISO might say ‘My entire security solution cost me $40,000’, another might quote a higher price but many companies will simply answer ‘What is the cost of no application security?’

</Read More>

What’s Hot in Application Security Vol #11

May 09, 2012 By Administrator | Is fear in the Cloud misplaced?
Who’s afraid of the big bad cloud? Everyone apparently! Corporations, Public Companies; the list is endless. Cloud Security is synonymous with problems. When we consider Cloud Security we think about application security and guarding sensitive data. Cloud Security has been one of the things on the front of the minds of IT directors for years as they ponder; how do we migrate data out of the corporate data centers to the cloud?

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.