Application Security News and Articles


Cradlepoint Adds SASE Platform for 5G Wireless Networks

Cradlepoint, a unit of Ericsson, today launched a secure access service edge (SASE) platform for branch offices using 5G wireless services to connect to the Internet. Camille Campbell, senior product marketing manager for Cradlepoint, said the ...

BTS #28 – 5G Hackathons – Casey Ellis

Casey recently was involved in an event that brought hackers and 5G technology together, tune-in to learn about the results and how we can use bug bounty programs to improve the security of “things”. This segment is sponsored by Eclypsium. ...

CCPA Compliance with Accutive Data Discovery and Masking: Understanding and protecting your sensitive data

What is the CCPA, the California Consumer Privacy Act? CCPA, or the California Consumer Privacy Act, is a law in California data privacy law that came into effect in early 2020. The CCPA grants California residents several key rights about how ...

USENIX Security ’23 – Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)

Authors/Presenters: *Federico Cernera, Massimo La Morgia, Alessandro Mei, and Francesco Sassi* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

USENIX Security ’23 – Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)

Authors/Presenters: *Federico Cernera, Massimo La Morgia, Alessandro Mei, and Francesco Sassi* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

CoralRaider Group Delivers Three Infostealers via CDN Cache

A threat group that’s been around since last year and was first identified earlier this month is using three high-profile information stealers in a wide-ranging campaign to harvest credentials, financial information, and cryptocurrency wallets ...

Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)

A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, ...

Daniel Stori’s ‘New Job’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s ‘New Job’ appeared first on Security Boulevard.

DirectDefense Report Sees Shifts in Cyberattack Patterns

Cyberattacks are continuing to become more sophisticated even as defenders become more adept at thwarting existing threats. The post DirectDefense Report Sees Shifts in Cyberattack Patterns appeared first on Security Boulevard.

Secure-by-Design Software in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes. The second part of his DevSecOps program is all about implementing secure-by-design software pipelines. The post Secure-by-Design Software in ...

USENIX Security ’23 – Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes

Authors/Presenters: *Massimiliano Taverna and Kenneth G. Paterson* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

How AI is Revolutionizing B2B SaaS: Driving Growth, Saving Time, and Boosting Your Bottom Line

AI is changing the game for B2B SaaS. Discover how it drives growth, boosts efficiency, and cuts costs. Get ahead of the curve! The post How AI is Revolutionizing B2B SaaS: Driving Growth, Saving Time, and Boosting Your Bottom Line appeared ...

1Kosmos CSP enables government agencies to digitally verify resident identity

1Kosmos has expanded its offerings for the identity verification and passwordless market with the introduction of a new Credential Service Provider (CSP) managed service based on the privacy-by-design 1Kosmos platform. The 1Kosmos CSP offering ...

Cyberint platform enhancements boost protection against external threats

Cyberint has unveiled a series of platform updates aimed at bolstering client protection against external threats. Cyberint’s recent platform innovations provide several new capabilities that support a range of strategic security ...

The Next Chapter of Behavioral Threat Assessment for Ontic and SIGMA

Our mission at Ontic is to keep people safe and make organizations stronger. We wake up every day thinking about new ways to help security teams be more efficient and effective in doing their important work. A little over two years ago, we ...

Zero Networks unveils identity segmentation solution to prevent credential theft

Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse ...

Nigeria, Romania, Russia, U.S. Among Top Cybercrime Nations

Russia and Ukraine topped a list of cybercrime-producing nations, followed by China and the United States, with African nation Nigeria rounding out the top five. The post Nigeria, Romania, Russia, U.S. Among Top Cybercrime Nations appeared first ...

Is Manual SOX Audit Prep Burning Out Your Team (And Your Budget)?

Company Controllers and Directors of Internal Audit are intimately familiar with the complexities and resource demands of SOX audits. While meticulous adherence to regulations is paramount, relying solely on manual processes for audit preparation ...

PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)

More details of and a proof-of-concept exploit for an unauthenticated OS command injection vulnerability (CVE-2024-2389) in Flowmon, Progress Software’s network monitoring/analysis and security solution, have been published. The critical ...

Dan Solove on Privacy Regulation

Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been pondering privacy consent for more than a decade, and I think I finally made a breakthrough with this article.” His ...