Log4j

SonicWall Data Reveals the Top Five Most Widespread Network Attacks Used Against Small Businesses

Retrieved on: 
Tuesday, April 30, 2024

MILPITAS, Calif., April 30, 2024 /PRNewswire/ -- A review of SonicWall telemetry data suggests that the most widespread network attacks to small businesses (SMBs) are older vulnerabilities with a large amount of publicly available information and affecting major vendors. In light of this data, prioritization is a critically important factor for today's CISOs who are asked to manage and prioritize risk. 

Key Points: 
  • In light of this data, prioritization is a critically important factor for today's CISOs who are asked to manage and prioritize risk.
  • "In order to properly prioritize threats, we must first understand what attacks, vulnerabilities, and tactics are being used by our enemies," said SonicWall Executive Director of Threat Research Doug McKee.
  • "Relying too heavily on one factor (e.g., CVSS scores) can lead to an incomplete view of the risk associated with a vulnerability.
  • From January 2022 to March 2024, using SonicWall IPS data, SonicWall determined the most widespread attacks against small businesses.

CAST brings artificial intelligence (AI) to application portfolio governance and software observability

Retrieved on: 
Thursday, April 18, 2024

NEW YORK and PARIS, April 18, 2024 (GLOBE NEWSWIRE) -- CAST, the software intelligence leader, has introduced an AI Advisor (beta) capability in the latest release of CAST Highlight , the automated observability and portfolio governance product for custom-built software.

Key Points: 
  • NEW YORK and PARIS, April 18, 2024 (GLOBE NEWSWIRE) -- CAST, the software intelligence leader, has introduced an AI Advisor (beta) capability in the latest release of CAST Highlight , the automated observability and portfolio governance product for custom-built software.
  • The AI Advisor helps users gain insights, interpret findings, navigate the product user interface, and get recommendations on the ideal actions to take across an application portfolio.
  • The new AI Advisor augments CAST Highlight’s existing ability to automatically ‘understand’ the source code of hundreds of applications in a matter of hours and provide intelligence across the portfolio.
  • “With the AI Advisor we’re taking a big step in making the complex world of portfolio governance and software observability as streamlined and intuitive as possible."

New Relic Releases 2024 State of the Java Ecosystem Report

Retrieved on: 
Tuesday, April 30, 2024

New Relic , the all-in-one observability platform for every engineer, released its fourth annual State of the Java Ecosystem report.

Key Points: 
  • New Relic , the all-in-one observability platform for every engineer, released its fourth annual State of the Java Ecosystem report.
  • The report is based on data from hundreds of thousands of applications and provides insights into the current state of the Java ecosystem, including how developers are using it and the most-used Java versions in production.
  • Java owes its popularity to its scalability and portability, allowing users to run on any device with a Java virtual machine (JVM).
  • Oracle releases new Java versions every six months, and new Java long-term-support (LTS) versions every two years.

Azul Intelligence Cloud Boosts DevOps Efficiency with Insights from Production Runtime Data Across Entire Java Estates

Retrieved on: 
Tuesday, April 30, 2024

Azul , the only company 100% focused on Java, today announced that Azul Intelligence Cloud , Azul’s cloud analytics solution which provides actionable intelligence from production Java runtime data to dramatically boost developer productivity, now supports Oracle JDK and any OpenJDK-based JVM (Java Virtual Machine) from any vendor or distribution.

Key Points: 
  • Azul , the only company 100% focused on Java, today announced that Azul Intelligence Cloud , Azul’s cloud analytics solution which provides actionable intelligence from production Java runtime data to dramatically boost developer productivity, now supports Oracle JDK and any OpenJDK-based JVM (Java Virtual Machine) from any vendor or distribution.
  • This has significantly sped up our development cycles,” said an Azul Intelligence Cloud user from a leading fintech trading firm.
  • Enables DevOps to understand what code is used in production and helps identify unused and dead code for removal (i.e.
  • No Performance Impact in Production: Azul Intelligence Cloud efficiently captures Java runtime data that exists within a JVM when running a Java application, resulting in no performance impact, something not possible using traditional security or profiling tools.

At 13 Attacks Per Second, Critical Infrastructure is Under Siege

Retrieved on: 
Wednesday, January 24, 2024

This lull has given rise to a surge in exploits targeting network infrastructure and Internet of Things (IoT) devices.

Key Points: 
  • This lull has given rise to a surge in exploits targeting network infrastructure and Internet of Things (IoT) devices.
  • Only 35% of exploited vulnerabilities made an appearance in the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) list.
  • The overarching objective is to elevate responses to complex critical infrastructure attacks by leveraging the detailed insights and understanding derived from this specialized deception environment.
  • The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure.

Snyk Launches Snyk AppRisk, Establishing the Next Era of Developer Security Focused on Enterprise-Scale Application Risk Management

Retrieved on: 
Tuesday, December 12, 2023

BOSTON, Dec. 12, 2023 (GLOBE NEWSWIRE) -- Snyk , the leader in developer security, today released Snyk AppRisk , a solution designed to empower application security (AppSec) teams with the comprehensive Application Security Posture Management (ASPM) workbench they need to govern and scale their security programs, as well as minimize risk arising from applications.

Key Points: 
  • BOSTON, Dec. 12, 2023 (GLOBE NEWSWIRE) -- Snyk , the leader in developer security, today released Snyk AppRisk , a solution designed to empower application security (AppSec) teams with the comprehensive Application Security Posture Management (ASPM) workbench they need to govern and scale their security programs, as well as minimize risk arising from applications.
  • Snyk AppRisk delivers automated application asset discovery, tailored security controls and risk-based prioritization to ensure developer and security teams are collaborating on risk via an advanced evidence graph linking development workflows to the apps deployed in the cloud.
  • As a result, developer and security teams can together define appropriate guardrails to prevent security issues throughout the full software development lifecycle (SDLC) as well as measure the overall effectiveness of their developer security program.
  • The need for developer and security teams to share application visibility, risk context and intelligent policy guardrails is critical to delivering innovation with trust.” said Manoj Nair, Chief Product Officer, Snyk.

Nearly All Software Used by U.S. Energy Companies Contains Code from Russian & Chinese Developers, New Fortress Information Security Research Finds

Retrieved on: 
Tuesday, December 5, 2023

ORLANDO, Fla., Dec. 5, 2023 /PRNewswire/ -- New research from Fortress Information Security shows software makers use a lot of code found on open-source platforms that they know very little about. Using available Software Bills of Materials (SBOMs) for software commonly used by U.S. energy companies, the Fortress research team found more than a thousand components coming from developers in adversarial nation-states like Russia and China. Additionally, some of the potentially compromised contributions can sit, unpatched, for years before being addressed.

Key Points: 
  • Using available Software Bills of Materials (SBOMs) for software commonly used by U.S. energy companies, the Fortress research team found more than a thousand components coming from developers in adversarial nation-states like Russia and China.
  • The Fortress researchers detailed their findings in a new report, A Software Supply Chain Dependent on Adversaries ( link ).
  • Software with Russian or Chinese-made code examined by Fortress research is 2.25 times more likely to have vulnerabilities.
  • But, until we have confidence secure by design software that isn't laced with malicious code, every software product could contain a ticking time bomb.

New Report Shows Disconnect Between Developers and Security Teams on Software Supply Chain Security Priorities and Responsibilities

Retrieved on: 
Wednesday, November 8, 2023

KIRKLAND, Wash., Nov. 8, 2023 /PRNewswire/ -- Chainguard, the leading software supply chain security company, today released the results of its inaugural report on the perspectives of CISOs and developers when it comes to tackling software supply chain security within their organization.

Key Points: 
  • The 2023 CISO & Developer Trends in Software Supply Chain Security Report , conducted by The Harris Poll, surveyed 520 security decision-makers (n=268) and developers (n=252) on how the different roles view overall responsibilities and expectations for software supply chain security, the importance of software supply chain security, and the pain points and successes in each team's approach to software supply chain security.
  • Despite disagreements on how each team views the other's security prowess or understanding of tooling, software supply chain security is a top priority for developers and security teams alike.
  • According to the report, in alignment with the importance already placed on software supply chain security by developers and CISOs, most say that their organizations already have some tools in place to address software supply chain security.
  • In addition to the existing adoption of software supply chain security tooling and frameworks, CISOs and developers expect changes to come in the next five years for software supply chain security at their organizations.

Azul State of Java Survey & Report 2023: 82% of Businesses Using Java Today Are Concerned With Oracle’s Fourth Major Change to Its Licensing/Pricing Policies, and 72% Are Exploring Java Alternatives

Retrieved on: 
Tuesday, October 24, 2023

Azul , the only company 100% focused on Java, released its first annual Azul State of Java Survey & Report today, an authoritative guide to understanding the current pulse, trajectory and sentiments surrounding Java.

Key Points: 
  • Azul , the only company 100% focused on Java, released its first annual Azul State of Java Survey & Report today, an authoritative guide to understanding the current pulse, trajectory and sentiments surrounding Java.
  • More than 8 out of 10 respondents (82%) using Oracle Java said they are concerned about the new Java SE Universal subscription pricing introduced in January .
  • To reduce public cloud costs, 46% of businesses are taking advantage of a high-performance Java platform to use cloud resources more efficiently.
  • The choices businesses make around Java directly impact their operational efficiency and the bottom line,” said Scott Sellers , co-founder and CEO at Azul.

Cybeats Partners with CodeSecure to Automate Software Supply Chain Security Management

Retrieved on: 
Tuesday, October 17, 2023

Cybeats Technologies Corp. (“Cybeats'' or the “Company”) (CSE: CYBT, OTCQB: CYBCF) and CodeSecure , formerly the products division of GrammaTech and a leading provider of application security testing products, today announced a technology partnership to help customers proactively monitor and remediate software supply chain security threats.

Key Points: 
  • Cybeats Technologies Corp. (“Cybeats'' or the “Company”) (CSE: CYBT, OTCQB: CYBCF) and CodeSecure , formerly the products division of GrammaTech and a leading provider of application security testing products, today announced a technology partnership to help customers proactively monitor and remediate software supply chain security threats.
  • Gartner® estimates that 40% to 80% of the lines of code in new software projects come from third parties.
  • “Together Cybeats Studio and CodeSentry enable customers to detect, manage and remediate security vulnerabilities in open source components to help prevent and better respond to software supply chain attacks like Log4j,” said Andrew Meyer, CMO, CodeSecure.
  • GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission.