Tag : social media

placeit-4

21 AppSec & Security Gurus You Should Be Following On Twitter

Oct 14, 2014 By Sarah Vonnegut |  Are you an AppSec Tweeter? 
  Whether you’re a newbie or an old-timer in the world of application security, Twitter is a great place to listen in and connect with some of the best and brightest in the industry. To help, we’ve compiled a list of some of our favorite tweeters to add to your own Twitter feed.    The list is a cross-section of people in Information Security and Application Security in specific – people whose Tweets we read daily. It’s in no way exhaustive, so please feel free to comment below with people we should add!   Many of these tweeters also maintain personal blogs revolving around application security, and we’ve included them in this post, as well. Build your blogroll along with who you follow on Twitter for double the industry insight!  
Bonus: Follow the whole list on our Twitter list!

</Read More>

What’s HOT in Application Security Vol #16

Jun 18, 2012 By Administrator | WHMCS still vulnerable after latest string of attacks
WHMCS is a UK supplier of technical support and customer service is yet again the victim of a Ddos attack, due to its inability to mend an already known SQL Injection vulnerability. The embarrassment continued for the company in the days following where a hacker was auctioning the rights to abuse the weakness using an underground forum.

</Read More>

Whats HOT in Application Security Vol #9

Apr 24, 2012 By Administrator | Lady Gaga keeps her poker face in light of SQL Injection!
Lady Gaga’s website had a ‘Bad Romance’ with an SQL Injection attack, revealing the personal details of thousands of fans! The hack was reported more than six months ago and was committed by a group of hackers going under the pseudoname ‘SwagSec’. Even though the hackers never actually published the personal information of the fans, it is a major embarrassment for Lady Gaga’s team.

</Read More>

Top 5 Cyber Threats to Businesses

Mar 28, 2012 By Administrator | According to FBI Director Robert Mueller, cyber-crime is on track to
surpass terrorism as the most serious security threat in the United States. Businesses in particular face an increasing risk of exposing themselves to cyber-attacks. Here is a list of the top five cyber threats that threaten businesses today.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.