News & Blog

Discover the most up-to-date CodeHunter malware insights and industry news.

News & Blog | CodeHunter
Latest Blog
The K-12 Cybersecurity Act of 2021 Was Signed into Law

The first ever federal legislation addressing cybersecurity in schools was launched quietly last month — and, while its a good first step, more legislation will undoubtedly...

Be the first to join the hunt!

Spotlight on our featured articles

Looking Back on Cybersecurity Awareness Month: Week 4 — Cybersecurity First

As we wrap up Cybersecurity Awareness Month, we’d like to thank CISA & NCSA for highlighting the importance of cyber safety. As cyber weather continues to change — with attacks increasing...

It’s Time to Automate Your Patch Management

As a leader in the cybersecurity world, we regularly advise readers and clients to patch early and often — but patching comes with its own problems. We hear you: Patching is not only inconvenient...

Cybersecurity Awareness Month ensures everyone has access to the tools and resources they need to stay safe online. This week, we’re here to #ExploreExperienceShare...

Cybersecurity Awareness Month: Week 3 — Explore. Experience. Share.
feature-image-us cybersecurity.png
How the U.S. is Raising the Bar on Cybersecurity

"You have the power, the capacity, and the responsibility to raise the bar on cybersecurity,” President Joe Biden told a room full of executives and cabinet members in August. With news of spyware...

Cybersecurity Awareness Month: Week 2 — Phight the Phish

Cybersecurity Awareness Month — an event spearheaded by CISA & NCSA — is designed to give everyone the tools and resources they need to stay safe online. This week, we’re here to... 

Kicking off Cybersecurity Awareness Month: Week 1 — Be Cyber Smart!

We’re thrilled to kick off Cybersecurity Awareness Month — spearheaded by CISA & NCSA to highlight the importance of cybersecurity. The cyber climate is only getting hotter...

It’s Time to Modernize Your Legacy Applications

If you’re like many of the CTOs, CISOs, and business leaders we work with, you’re likely frustrated by clunky legacy applications...

CodeHunter-6-ways-will-benefit-your-team.png
6 Ways CodeHunter Will Benefit Your Team

No cybersecurity experience? No problem. CodeHunter gives all cybersecurity professionals the ability to hunt malware...

Four Ways Hackers Will Exploit Your Multi-Factor Authentication Software | CodeHunter
Four Ways Hackers Will Exploit Your
Multi-Factor Authentication Software

How to identify potential risks and protect your data Don’t let your guard down! All of us use passwords to protect our data, but a password alone ...

It’s Time to Use More Sophisticated Malware Detection Software | CodeHunter
It’s Time to Use More Sophisticated Malware Detection Software

Hard truth: It's no longer safe to rely on traditional cybersecurity systems. Technology is constantly changing — and bad actors are becoming increasingly...

Five Risk Mitigation Techniques To Protect Your SDLC

Adjusting your Software Development Life Cycle (SDLC) for potential threats from third-party software Risky business in the digital world...

Is Your Vulnerability Scanning Software Missing the Mark? | CodeHunter

Is Your Vulnerability Scanning Software Missing the Mark?

Understanding the risks and resolutions for mapping malicious behavior in developer code using Behavioral Computation Old systems, new...

Defend Your Critical Infrastructure With A Robust Framework | CodeHunter

Defend Your Critical Infrastructure With A Robust Framework

How a cyber attack could damage your organization, and what you can do TODAY to prevent it...

Check out our latest white papers
The White House Executive Cybersecurity Order Prioritizes Testing and Validating Code

The White House Executive Cybersecurity Order Prioritizes Testing and Validating Code

In the past seven years, the United States has battled hundreds of millions of malware attacks. In recent years, those attacks have grown in both intensity and malice. Noticing the rising need to protect the Nation’s industries and the infrastructure of modern society...

Protect Critical Infrastructure and Save Lives With Code Hunting Strategies

Protect Critical Infrastructure and Save Lives With Code Hunting Strategies

We are living in the age of a digital revolution. Each day, newsfeeds showcase new technology that pushes us closer and closer to the futuristic vision of widely accessible flying cars and human diagnostic systems. However, with every noble hero using these...

How to Mitigate Risk in the Supply Chain by Testing Third Party Software Code

How to Mitigate Risk in the Supply Chain by Testing Third Party Software Code

The natural assumption is trust when organizations adopt third party software, an assumption that could lead to irreversible damage. Hackers often target the digital supply chain, given that it can affect many people, leading to a large payout. Supply chain secu...

 

Be the first to join the hunt!

Leave us your email and you'll be among the first to gain access to CodeHunter, the worlds first automated malware hunting platform. Be part of cybersecurity history!

Codey-Envelope.png

Be the first to join the hunt!

Leave us your email and you'll be among the first to gain access to CodeHunter, the worlds first automated malware hunting platform. Be part of cybersecurity history!

Codey-Envelope.png