Tag Archive for: Acquires

HackerOne Acquires Code Security Tester PullRequest


HackerOne, the world’s most trusted provider of ethical hacking solutions, announced its acquisition of PullRequest, the pioneer of code-review-as-a-service. 

PullRequest’s technology and code reviewers will enable developer-first security testing solutions. These changes will ultimately help customers release trustworthy software faster by embedding expert security reviewers within their software development lifecycles (SDLCs).

Security remains a notorious blocker to innovation as organizations race to remain competitive in an increasingly digital world. Nearly half of developers feel more responsibility for security as their organizations prioritize security earlier in the SDLC. Code-review-as-a-service enables developers to identify issues faster with direct real-time feedback to make better code changes so high-quality, secure code ships to production.

PullRequest is trusted by thousands of organizations, from small startups to internet giants and government organizations. PullRequest offers code review to its customers via its reviewer community of senior-level developers, with expertise spanning platforms, from web to mobile, and all common coding languages and frameworks including React, Python, and Node. All reviewers are extensively background checked, evaluated for aptitude, and hold years of experience as software engineers at leading technology companies in Silicon Valley. 

Alex Rice, HackerOne Co-founder and CTO
Developer-first is the future of application and cloud security. Over 70% of organizations claim to integrate aspects of security earlier in development to minimize their attack resistance gap, yet less than 25% of security issues are found during development. We’re bringing feedback from security experts to the developer workflow so they can quickly fix bugs and get back to building.

Lyal Avery, CEO and founder of PullRequest
We founded PullRequest to help developers produce high-quality code, and quality is inseparable from security and privacy. Together, HackerOne and PullRequest will expand our now united mission to better serve all those working to build a safer internet for everyone.

Source…

Proton AG acquires SimpleLogin, an email alias service


1. Protonmail Behaves like a CIA/NSA “Honeypot”

Protonmail has an Onion domain that allows users to visit their site using the TOR browser. Protonmail even has an SSL cert for that onion address even though it’s completely unnecessary. When a user makes a new account with Protonmail on TOR they are re-directed from Protonmail’s “.onion” to “.com” address. This breaks your secure encrypted connection to their onion address, enabling your identification. There are absolutely no technical reasons for this feature. In fact, the only other websites that operate like this are suspected NSA/CIA Honeypots.

This is a huge security issue that was either created because Protonmail is managed by Particle physicists who do not understand computer security OR they have been forced to operate their website in a similar way as CIA/NSA honeypots. Both possibilities are serious concerns.

2. Protonmail Does Not Provide “End to End Encryption”

Professor Nadim Kobeissi mathematically proved that Protonmail does not provide End to End Encryption. Meaning, Protonmail has the ability to decrypt their own user’s data. When this was shown to be true, Protonmail users were outraged they had been lied to. Protonmail was forced to issue a public statement. Their statement begins like you would expect it would.. by shitting on the security researcher that revealed their dishonesty. Then they continued to say: “We lied to our users because other email companies did”. No apologies. They can decrypt any of their user’s data be sending them scripts that allow them to do so. However they advertise that they can not. Protonmail’s admission proves they offer the same security that Gmail offers. Both Gmail and Protonmail offer encryption that they can decrypt whenever they want.

3. Protonmail’s Was Created Under CIA/NSA Oversight

Gmail & Protonmail were both created in CIA/NSA funded departments with their oversight. Protonmail has tried to hide this part of their history. We wrote a whole article about it here.

4. Protonmail is Part Owned by CRV and the Swiss Government

After a successful crowdfunding campaign with promises to “remain independent” Protonmail sold equity ownership…

Source…

VEON Acquires Cloud IT Infra Provider IBS DataFort


VEON, a leading global provider of connectivity and internet services, has acquired IBS DataFort a cloud IT infrastructure provider. 

The acquisition was made by VEON’s VimpelCom Russian subsidiary that runs the Beeline mobile operator brand and IBS DataFort will be integrated into Beeline’s BeeCLOUD business unit.

IBS DataFort is a fast-growing provider of IT and security services and is one of the largest and fastest growing cloud computing companies in Russia. The company has been in the information technology market since 2001 and offers managed private, public and hybrid cloud services to address a full range of business needs. 

Source…

Zimperium Acquires Mobile Application Security Pioneer whiteCryption | Business


DALLAS & SAN FRANCISCO–(BUSINESS WIRE)–Jul 6, 2021–

Zimperium, the global leader in mobile security, has broadened its portfolio of mobile application protection solutions by acquiring whiteCryption, a leading provider of advanced application shielding and cryptographic key protection. Zimperium acquired whiteCryption from an investment group led by Intertrust, the pioneer in trusted computing and digital rights management (DRM) technology. Zimperium will continue to support current whiteCryption customers and will integrate whiteCryption’s solutions into Zimperium’s Mobile Application Protection Suite ( MAPS ), creating the world’s most advanced mobile application protection solution.

Zimperium MAPS helps enterprises build secure mobile apps that are natively resistant to attacks. MAPS is the only platform that protects mobile apps end-to-end, from in-development to on-device. With the addition of whiteCryption’s technologies, MAPS provides app scanning, app shielding, runtime protection, and protection of sensitive cryptographic keys in one platform. MAPS’ centralized threat management dashboard provides real-time threat visibility and the ability to respond to emerging risks and attacks detected.

“With mobile applications containing and processing an increasing amount of critical personal and business information, the risks and attacks have increased too,” said Phil Hochmuth, Program Vice President of Enterprise Mobility, IDC. “In response, organizations want to unify mobile application protection to improve visibility and prevent security gaps between point products.”

In an ever-expanding world of mobile and IoT devices, mission critical software often runs in an attacker’s back pocket or automobile. Zimperium’s solutions extend the secure perimeter from the app developer’s desktop all the way into the zero-trust environment, providing 360-degree protection.

“To provide our customers with the best security and the most value, Zimperium believes that every part of a unified mobile application protection solution should be…

Source…