Newsroom
Avocado newsroom

Blogs, solutions, events, news, and more.

PASTA and Threat modeling

Risk-Based Threat Modeling with PASTA and Avocado as an Automated Tool

Risk-Based Threat Modeling with PASTA and Avocado as an Automated Tool This summary explores Risk-Based Threat Modeling through the Process for Attack Simulation and Threat... Learn more
AI Blog Events IoT IoT Security News Resources
Tags
Reset filters

Let’s meet at OWASP Meetup

Join us on, March 25, 2025, at 5:30 PM at the KPMG, Santa Clara office for an evening of networking and learning. This in-person event...
Learn more
PASTA and Threat modeling

Risk-Based Threat Modeling with PASTA and Avocado as an Automated Tool

Risk-Based Threat Modeling with PASTA and Avocado as an Automated Tool This summary explores Risk-Based Threat Modeling through the Process for Attack Simulation and Threat...
Learn more

The Critical Importance of IoT Security in Manufacturing

The Importance of IoT and What are the Threats to PLCs The Internet of Things (IoT) has revolutionized the manufacturing industry by connecting factory floors,...
Learn more
Avocado Welcomes Cybersecurity Visionary Colin Mc Hugo

Avocado Expands into Europe, Welcomes Cybersecurity Visionary Colin Mc Hugo

In a strategic move to broaden its footprint, Avocado Systems, a trailblazer in cybersecurity innovations, has announced its expansion into the European market. This expansion...
Learn more
How Artificial Intelligence is Transforming Application Security

How Artificial Intelligence is Transforming Application Security

Introduction In recent years, the landscape of cybersecurity has been dramatically reshaped by high-profile breaches and attacks. The 2017 Equifax data breach exposed the personal...
Learn more
Advanced Persistent Threats

Advanced Persistent Threats, What They Are, How They Work, And Examples

In short, APTs or advanced persistent threats are a broad category describing different attack campaigns during which the intruders manage to create a long-term illicit...
Learn more
Supply Chain Attacks

What Are Supply Chain Attacks, Examples, And How To Prevent Them

Supply chain attacks have become more prevalent lately to the point that they managed to damage vital US infrastructures in 2021. As a result, the...
Learn more
Shift-Left Security

Shift-Left Security – What it is And 5 Benefits

With cyberattacks getting more frequent, intricate, and often more severe, both developers and security experts need to be alert and continuously monitor their systems to...
Learn more
Remote Code Execution

Remote Code Execution – What Is It And How To Prevent It

Cyber attackers use an increasingly wide range of methods and techniques to exploit vulnerabilities in various organizational systems and get their hands on precious information...
Learn more
Load more