Application Security News and Articles


Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)

For the third time in the last seven days, Google has fixed a Chrome zero-day vulnerability (CVE-2024-4947) for which an exploit exists in the wild. About CVE-2024-4947 CVE-2024-4947 is a type confusion vulnerability in V8, Chrome’s JavaScript ...

Master Third-Party Vendor Monitoring: Join Our Exclusive Webinar Hosted by Jonathan Care

Join Ekran System for an insightful webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who will unveil powerful strategies for optimizing third-party vendor monitoring.  Attend the webinar to learn about ...

Palo Alto Networks partners with IBM to deliver AI-powered security offerings

Palo Alto Networks and IBM announced a broad-reaching partnership to deliver AI-powered security outcomes for customers. The announcement is a testament to Palo Alto Networks’ and IBM’s commitment to each other’s platforms and ...

Is an open-source AI vulnerability next?

AI has captured widespread interest and offers numerous benefits. However, its rapid advancement and widespread adoption raise concerns, especially for those of us in cybersecurity. With so much interest, there are lots of insecure applications ...

OWASP dep-scan: Open-source security and risk audit tool

OWASP dep-scan is an open-source security and risk assessment tool that leverages information on vulnerabilities, advisories, and licensing restrictions for project dependencies. It supports local repositories and container images as input ...

Ebury botnet compromises 400,000+ Linux servers

ESET researchers released its deep-dive investigation into one of the most advanced server-side malware campaigns. It is still growing and has seen hundreds of thousands of compromised servers in its at least 15-year-long operation. The Ebury ...

Product showcase: Block ads, cookie pop-ups, trackers with CleanWeb

A study by PageFair revealed that ad blocker usage surged by 30% in 2016 alone, reflecting a growing public concern for privacy and uninterrupted browsing. Fast-forward to today, and the numbers are even more dramatic. According to Forbes, ...

Cloud security incidents make organizations turn to AI-powered prevention

Cloud security incidents are alarmingly on the rise, with 61% of organizations reporting breaches within the last year, marking a significant increase from 24% the year before, according to Check Point. This trend underscores the escalating risk ...

The critical role of IT staffing in strengthening cybersecurity

Many organizations lack adequate IT staffing to combat cyber threats. A comprehensive approach to cybersecurity requires more than technical solutions. It involves the right staff with the unique expertise necessary to recognize and prevent ...

15-Year-Old Ebury Botnet Compromised 400,000 Linux Servers

The operators behind the Ebury server-side malware botnet have been doing business since at least 2009 and, according to the threat researchers who have been tracking it for the last decade, are stronger and more active than ever. The malware has ...

USENIX Security ’23 – It’s All In Your Head(Set): Side-Channel Attacks On AR/VR Systems

Authors/Presenters:Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael Abu-Ghazaleh Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

NVD Update: More Problems, More Letters, Some Questions Answered

We're not saying the NVD is dead but it's not looking good. The post NVD Update: More Problems, More Letters, Some Questions Answered appeared first on Mend. The post NVD Update: More Problems, More Letters, Some Questions Answered appeared first ...

Sonatype Lifecycle best practices: InnerSource

InnerSource Insight facilitates collaboration and enhances code quality across teams. The post Sonatype Lifecycle best practices: InnerSource appeared first on Security Boulevard.

Dell Hell Redux — More Personal Info Stolen by ‘Menelik’

Phish Ahoy! Hacker took advantage of Dell’s lack of anti-scraping defense. The post Dell Hell Redux — More Personal Info Stolen by ‘Menelik’ appeared first on Security Boulevard.

Microsoft’s May 2024 Patch Tuesday Addresses 3 Zero-Days, 61 Vulnerabilities

In Microsoft’s May 2024 Patch Tuesday, the company reported significant updates aimed at enhancing the security of various systems by addressing a total of 61 vulnerabilities. This update is crucial, as it includes patches for one critical ...

Find Deeply Hidden Security Vulnerabilities with Deeper SAST by Sonar

This post delves into an actual Jenkins vulnerability to understand the intricacies of deeper SAST for detecting deeply hidden code vulnerabilities. It illustrates how deeper SAST works and explains its impact on keeping your code clean and free ...

Daniel Stori’s ‘Kernel Economics’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s ‘Kernel Economics’ appeared first on Security Boulevard.

Investing Wisely: The Financial Benefits of Strong Cyber Resilience

What are the financial performance benefits of strong cyber governance? In a blog series dedicated to the SEC’s new rules, we haven’t talked much about the connection between cybersecurity and Read More The post Investing Wisely: The ...

Phish Sticks; Hate the Smell, Love the Taste

Phishing School I’ll Make You Great at Phishing or Your Money Back I am already making you better at phishing. Right now. How could that be possible? Please, don’t worry about specifics right now. Just trust that I am making you better at ...

Plenty of Phish in the Sea

Phishing School How to Find the Right Phishing Targets A weapon is useless unless you have something to aim it at. When we weaponize social engineering, our targets are the humans who have the ability to give us access to the systems and data we ...