Effective Content Disarm and Reconstruction

Effective Content Disarm and Reconstruction

Content Disarm and Reconstruction (CDR) is an old technique, used by defence systems to protect themselves from malware. The idea is to deconstruct a file into its parts, remove any parts that are executable code or scripts, and then reconstruct the file, making...
The Latest Intel on Wipers

The Latest Intel on Wipers

The mass distribution of wiper malware continues to showcase the destructive evolution of cyberattacks. Does the evidence corroborate the theory that the ongoing conflict in Europe is to blame for the rise in wipers? Indeed. Furthermore, given that Russia is...
Open source: the top-10 risks for business

Open source: the top-10 risks for business

IT companies were the first to go open source, and many large businesses followed suit. After all, the ability to reuse and independently modify code as well as fix bugs spurs rapid innovation and cost reduction. But open source has some inherent negative...
Getting real on AI in application security

Getting real on AI in application security

AI is definitely the hot topic right now, and a lot of people are throwing around or downright parroting information and opinions. Invicti’s CTO and Head of Security Research, Frank Catucci, spoke to Mike Shema on episode #234 of the Application Security Weekly...
The Heavy Price of “Free” SaaS Applications

The Heavy Price of “Free” SaaS Applications

As organizations continue to adopt SaaS applications at an accelerating pace, there’s a growing focus among IT leaders on cost optimization to eliminate the waste associated with SaaS subscriptions. Gartner® estimates the average company wastes 25% of their...