Skip to content

AppSec Observer: cyberattacks

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Cybersecurity Insights with Contrast CISO David Lindner | 12/06/24

    Cybersecurity Insights with Contrast CISO David Lindner | 12/06/24

    Insight #1: The NIST CVE backlog is hogtying CISOs The NIST CVE backlog is a digital plague crippling a critical..

    Anatomy of an attack

    Anatomy of an attack

    In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting..

    Cybersecurity Insights with Contrast CISO David Lindner | 7/26/24

    Cybersecurity Insights with Contrast CISO David Lindner | 7/26/24

    Insight #1 A North Korean hacker, using a deep-faked identity, was hired by the U.S. cybersecurity firm KnowBe4...

    Cybersecurity Insights with Contrast CISO David Lindner | 7/19/24

    Cybersecurity Insights with Contrast CISO David Lindner | 7/19/24

    Insight #1 It's been a while since I reminded everyone that one of the single greatest controls to implement to prevent..

    Contrast discovers CSRF vulnerability in NSA’s SkillTree training platform that allows attackers to modify content

    Contrast discovers CSRF vulnerability in NSA’s SkillTree training platform that allows attackers to modify content

    Contrast Security Assess — Contrast’s Interactive Application Security Testing (IAST) Application Security (AppSec)..

    Cybersecurity Insights with Contrast CISO David Lindner | 6/21/24

    Cybersecurity Insights with Contrast CISO David Lindner | 6/21/24

    Insight #1 It’s easy to get distracted by listicles about the hottest IT security certifications that will boost your..

    Cybersecurity Insights with Contrast CISO David Lindner | 6/14/24

    Cybersecurity Insights with Contrast CISO David Lindner | 6/14/24

    Insight #1 How many breaches do we need to endure before we realize that multifactor authentication (MFA) is the most..

    How Contrast ‘secures from within:’ Code vulnerabilities set off smoke alarms; runtime incidents & cyberattacks trigger the sprinklers

    How Contrast ‘secures from within:’ Code vulnerabilities set off smoke alarms; runtime incidents & cyberattacks trigger the sprinklers

    What does Contrast Security mean when we say “secure from within?”

    Cybersecurity Insights with Contrast CISO David Lindner | 6/07/24

    Cybersecurity Insights with Contrast CISO David Lindner | 6/07/24

    Insight #1 In the digital age, data has become an incredibly valuable asset. Just as oil was a driving force in the..