cybersecurity

5 Ways to Protect Against XSS Attacks

5 Ways to Protect Against XSS Attacks

JavaScript has evolved significantly from its early days of being lightly sprinkled on static HTML web pages to add dynamism. It now plays a crucial role in modern web applications, making cross-site scripting (XSS) a common security vulnerability with significant impact if exploited successfully. From providing client-side functionality to running across the entire application stack, […]

5 Ways to Protect Against XSS Attacks Read More »

Generative AI Security: Insights from the OWASP Top 10 for LLM Applications

Generative AI Security: Insights from the OWASP Top 10 for LLM Applications

The Open Web Application Security Project (OWASP) has compiled the Top 10 for LLM applications as another list-style awareness document to provide a systematic overview of the application security risks, this time in the rapidly growing realm of generative AI. While everyone is aware of some of the risks related to large language models (LLMs),

Generative AI Security: Insights from the OWASP Top 10 for LLM Applications Read More »

Understanding the differences between Application Security and Development Security Operations

Understanding the differences between Application Security and Development Security Operations

You may have seen, especially on social media, many “expert” opinions on cybersecurity that freely mix and match seemingly unrelated terms. In the field of application security specifically, you will see people asking about things like the difference between AppSec and DevSecOps—a really strange thing to ask until you realize that in some contexts, people

Understanding the differences between Application Security and Development Security Operations Read More »

The Benefits of Using Predictive Risk Scoring for AI in Security

The Benefits of Using Predictive Risk Scoring for AI in Security

Invicti recently introduced its groundbreaking Predictive Risk Scoring feature, which can provide accurate security risk predictions even before vulnerability scanning starts. To learn more about Predictive Risk Scoring, visit our blog post here. This feature utilizes a custom-built machine learning model trained on real vulnerability data (not customer data) to estimate site risk levels and

The Benefits of Using Predictive Risk Scoring for AI in Security Read More »

Selecting the Appropriate Application Security Tools

Selecting the Appropriate Application Security Tools

Modern application security must be built in from the outset and reinforced continually throughout the software development lifecycle. Even organizations with mature application development practices need automated tools to successfully and repeatably secure their software in complex, fast-changing environments. Security leaders commonly focus on ensuring software security through runtime protection measures, with major cloud service

Selecting the Appropriate Application Security Tools Read More »

What is DevSecOps and how is it evolving?

The Evolution of DevSecOps: Understanding its Definition and Progress

DevSecOps is a software development approach that aims to integrate security practices into DevOps processes. Implementing DevSecOps efficiently requires organizations to make security an integral part of software quality by using automated security tools in their CI/CD pipeline. Crucially, the DevSecOps approach to software development offers a way to embed application security into the entire

The Evolution of DevSecOps: Understanding its Definition and Progress Read More »

The Popular Cybersecurity Framework Grows Up

The Popular Cybersecurity Framework Grows Up

The NIST cybersecurity framework has been a go-to resource for defining cybersecurity strategies, policies, and activities ever since version 1.0 was published back in 2014. Originally intended specifically for US companies operating critical infrastructure, it soon gained popularity across all industries and is used by CISOs worldwide. February 2024 saw the launch of version 2.0

The Popular Cybersecurity Framework Grows Up Read More »

The xz-utils backdoor: The supply chain RCE that got caught

The Supply Chain RCE That Was Exposed

Important Information   The xz-utils package in versions 5.6.0 and 5.6.1 contains a malicious backdoor that could potentially allow remote access to SSH sessions for remote code execution (RCE) on certain Linux systems under specific circumstances and configurations. It is recommended that all Linux users verify their xz-utils version is earlier than 5.6.0 and downgrade

The Supply Chain RCE That Was Exposed Read More »