Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malicious Packages Special Report - Attacks Move Beyond Vulnerabilities

Threat actors are after our sensitive data. In 2023, the number of malicious packages published to Node Package Manager (npm) and RubyGems ballooned 315% compared to 2021, and 85% of malicious packages discovered in existing applications were capable of exfiltration – meaning they could cause an unauthorized transmission of information. Software packages containing malicious code are a growing threat, and they may have unknowingly infiltrated your applications.

AWS and Mend.io Webinar: Five Principles of Modern Application Security Programs

Organizations of all kinds are experiencing increasing volumes, frequency, and severity of cyberattacks. 71% of IT and security leaders say that their portfolio of applications has become more vulnerable in the last year alone, and cybercrime is expected to cost companies worldwide around $10.5 trillion annually by 2025. To fight this trend, organizations need a resilient AppSec strategy that can reinforce trust, reliability, and security when faced with adverse conditions.

How Supply Chain Attacks Work - And What You Can Do to Stop Them

Supply chain attacks made headlines in 2022, sending shockwaves through the industry as security and business leaders scrambled to reexamine the security of their own supply chains. In this webinar, experts talk through the stages of a supply chain attack and the different types of attacks to look for. You will also learn what tools and strategies you can start using immediately to assess your own supply chain security and put defenses in place to keep your supply chain protected.

The CISO's Guide to AppSec Innovation

Threat actors operate by an ironclad rule: If it’s important to businesses, it’s important to them. And they certainly understand the crucial business role of applications. Applications are now the number one attack vector, while software supply chain attacks increased 650 percent in a year. Clearly, if you don’t already have a modern application security program that can support today’s digital world, you need to build one.

Securing the Software Supply Chain: Key Findings From the Mend Open Source Risk Report

Open source vulnerabilities are in permanent growth mode. A significant quarterly increase in the number of malicious packages published in registries such as npm and rubygems have shown the increasing need to protect against this trending attack. At the same time, companies struggle to close the remediation gap on known vulnerable open source code. It’s all in The Mend Open Source Risk Report, which details these and other significant risks posed by the ongoing rise in open source vulnerabilities and software supply chain attacks.

Best in Class for Data Protection

It has been a month since 11:11 Systems announced a new partnership with Veeam and AWS, bringing together global leaders in data protection and modern cloud architecture. That month has been quite a busy one for us as we begin rolling out solutions that leverage the best from our partnership and bring a new generation of services to 11:11 Systems’ core capabilities. Today we have production-level services available around the globe to make use of the innovations outlined in this post.

Many North Carolina Hospitals Suffer From Serious Chain of Data Breaches

North Carolina hospitals were under attack from a streak of data breaches back in May of this year. The breaches resulted in some lost medical and personal information for many facilities throughout North Carolina. If you attended a hospital in North Carolina, there's a good chance at least some of your information was exposed by the breaches.

Non-Profit Save the Children Gets Hit By Ransomware Data Attack

Save The Children is an organization that specializes in helping children live healthy lives. The non-profit works in multiple countries, helping to provide for children's needs, especially in areas affected by war or tragedy. This organization was recently the target of a ransomware hacker group and suffered huge data losses as a result of that targeting.

Why Log4j Wasn't the Developers' Fault: Understanding the Challenges of Modern Developers

In today’s fast-paced digital world, software developers face many challenges as they work tirelessly to create and maintain applications that power our daily lives. The recent Log4Shell vulnerability, which exposed a critical flaw in the widely used Log4j library, has drawn widespread attention and criticism.

To the Left, To the Left

Shifting left, reminiscent of Beyoncė’s famous song, Irreplaceable, is not just a passing trend but a fundamental shift in how we approach software development and security. Historically, security has often been an afterthought — a box to check once the software’s built. However, this reactive approach has proven inadequate in today’s cybersecurity landscape.