Application Security News and Articles


DEF CON 32 – Laundering Money

Author/Presenter: Michael Orlitzky Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Top cyber attacks of 2024: Lessons from the year’s biggest breaches

The cyber attacks of 2024 were memorable to say the least. This year, cybercriminals targeted critical industries and high-profile organizations, using increasingly sophisticated tactics to exploit The post Top cyber attacks of 2024: Lessons ...

Will AI Drive Efficiency and Budget Growth? Risks, Rewards & Reality

The post Will AI Drive Efficiency and Budget Growth? Risks, Rewards & Reality appeared first on AI-Enhanced Security Automation. The post Will AI Drive Efficiency and Budget Growth? Risks, Rewards & Reality appeared first on Security ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #317 – Paywall

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

Log4Shell Vulnerability | Why it Still Exists and How to Protect Yourself | Contrast Security

Three years ago, Log4Shell was the worst holiday gift ever for security teams, particularly given that it was wrapped in a CISA order to patch by Christmas Eve.  The post Log4Shell Vulnerability | Why it Still Exists and How to Protect Yourself ...

AI-Powered Actions Cybersecurity Leaders Are Taking to Outwit Bad Actors

As a cybersecurity executive, your job is clear: protect business operations, safeguard consumers and ensure the security of your employees. But in today’s rapidly evolving threat landscape, these responsibilities are more challenging than ...

Diamond Bank Addresses Spoof Websites

Diamond Bank is a community bank with 14 branches and thousands of customers in the Southwest Arkansas region. The bank celebrated its 120th anniversary in 2024 and takes great pride in its longevity and connection to the community. Spoof Website ...

Impart is now available in the AWS Marketplace | Impart Security

Today, we are thrilled to announce that Impart is now available in the AWS Marketplace. More Streamlined Contracting AWS customers with existing spend commitments can apply their Impart purchase toward their AWS commitment. This availability ...

DEF CON 32 – Measuring the Tor Network

Authors/Presenters: Silvia Puglisi, Roger Dingledine Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

SAML (Security Assertion Markup Language): A Comprehensive Guide

Dive into the world of Security Assertion Markup Language (SAML), from its core concepts to practical implementation. Learn how this powerful standard enables secure authentication and single sign-on across different security domains. The post ...

North Korean Hackers Stole $1.34 Billion in Crypto in 2024

North Korean hackers stole $1.34 billion in cryptocurrency in 2024, more than half of the $2.2 billion stolen in all crypto hacks, and the attacks by threat groups linked to the rogue nation are becoming more frequent and are happening more ...

How to Handle Secrets in Configuration Management Tools

Configuration management tools like Ansible, Chef, and Puppet offer various methods for handling secrets, each with inherent trade-offs. The article explores these approaches alongside modern OIDC-based solutions that enable short-lived ...

Cybersecurity Insights with Contrast CISO David Lindner | 12/20/24

Insight No. 1: Forget the hype. Cloud security is a battlefield, and you're woefully unprepared. Let's cut the crap. Everyone's talking about cloud security, but most organizations are still playing catch-up. You think those cloud providers have ...

Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight

Check out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the ...

OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms

OPSWAT this week revealed it has acquired Fend, Inc. to further extend the reach of its cybersecurity portfolio into the realm of operational technology (OT). The post OPSWAT Acquires Fend to Extend Cybersecurity Reach Into OT Platforms appeared ...

CISA: Use Signal or other secure communications app

In the wake of the widespread compromise of US telecom giants’ networks by Chinese hackers and the FBI advising Americans to use end-to-end encrypted communications, CISA is advising “highly targeted individuals” – senior ...

How Zimperium Can Help With Advanced Spyware Such as NoviSpy

Discover how Zimperium can help with advanced spyware such as NoviSpy. The post How Zimperium Can Help With Advanced Spyware Such as NoviSpy appeared first on Zimperium. The post How Zimperium Can Help With Advanced Spyware Such as NoviSpy ...

Another NetWalker affiliate sentenced to 20 years in prison

A 30-year old Romanian man was sentenced to 20 years in prison for leveraging the Netwalker ransomware to extort money from victims, the US Department of Justice announced on Thursday. Daniel Christian Hulea, of Jucu de Mijloc, Cluj, Romania, was ...

What is Security Testing? A Beginner’s Guide

Explore how security testing safeguards your applications, tackles threats like SQL injection, and ensures robust protection with advanced tools and techniques. The post What is Security Testing? A Beginner’s Guide appeared first on Security ...

Insider Threat Indicators

Nisos Insider Threat Indicators Security threats can come from trusted individuals within your organization or partners, contractors, and service providers with authorized access to sensitive systems and data... The post Insider Threat Indicators ...