
Zoom joins the vulnerability fray: Will VISS move the needle on AppSec?
Here's what you need to know about Zoom's Vulnerability Impact Scoring System, how it compares to EPSS — and how it can advance your application security.

Here's what you need to know about Zoom's Vulnerability Impact Scoring System, how it compares to EPSS — and how it can advance your application security.

Enhancing Endpoint Visibility: Leveraging Advanced File Intelligence to Uncover Evasive Threats

The government added important new guidance in 2023. Get up to speed — and see our interactive timeline of recent attacks to stay ahead of them in 2024.

Here's why organizations are struggling with TPCRM — and how to develop an effective program.

The analyst firm Gartner® released a new report on software supply chain risk that recommends identification of malware or malicious code.

The TeamCity incident is similar to SunBurst, which was behind the attack on SolarWinds. But there are differences. Here are tips to help secure your software pipeline.
.webp&w=3840&q=75)
To advance the state of software supply chain security and better mitigate risk, the Enduring Security Framework group has highlighted the need for binary analysis and reproducible builds.

Cross-Platform Threats: Leveraging YARA to Identify BiBi Wiper on Linux and Windows Systems

ReversingLabs researchers have uncovered two novel techniques running on GitHub — one abusing GitHub Gists, another issuing commands through git commit messages.

More than 1,500 tokens were exposed, leaving millions of AI models and datasets vulnerable. Here's what your security team can learn from the compromise.

U.K. and U.S. cyber-watchdogs say to start with Secure by Design — but don't stop there. Here are key takeaways from their new guidelines.

SolarWinds, Codecov, and Kaseya showed how adversaries with access to a development environment can wreak havoc. Multifactor authentication is key, but it's not an "end-all solution."

Mature organizations recognize that their AppSec approach has to keep pace with modern development teams. Here's why.

While AI is mostly seen as opening a new front in the threat landscape, it will also be tapped to fight back with advanced threat hunting and more.

The Threat Modeling Manifesto explains the how. Now teams must map out an actionable threat modeling program. Here are 10 key tips to get started.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial