Application Security News and Articles


Code Security and GDPR Compliance: Protecting Personal Data Through Secure Code

The General Data Protection Regulation (GDPR) has significantly elevated the standards for handling personal data. As organizations…Continue reading on Medium »

FAQ: How Are STIGs, SRGs, SCAP, and CCIs Related?

In the world of government-adjacent security and compliance, there are many different terms and acronyms you’ll encounter for the processes you have to perform. Often, these terms are interrelated in a single process, so you tend to learn them ...

Response to CISA Advisory (AA24-207A): North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs

AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-207A) published on July 25, 2024, that highlights cyber espionage activity associated with the Democratic People’s Republic of Korea (DPRK)’s ...

CrowdStrike Update Created Widespread Outage

As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day due to a CrowdStrike content update for Microsoft Windows hosts. Pondurance and its systems were not affected by the issue, and Pondurance ...

Negotiate Your Next Cyber Insurance Policy With This 6-Step Playbook

TL;DR: Cyber liability insurance is essential, but premiums are increasing, and numerous exclusions exist. Important steps to lower premiums include preparation, articulating your risk, and demonstrating progressive improvement in security ...

USENIX Security ’23 – SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning

Authors/Presenters:Salim Al Wahaibi, Myles Foley, Sergio Maffeis Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

What is Cloud Security Automation? Why You Need it

The post What is Cloud Security Automation? Why You Need it appeared first on AI-enhanced Security Automation. The post What is Cloud Security Automation? Why You Need it appeared first on Security Boulevard.

Scams to steer clear of as a college student, from a college student

Scammers target people of all ages, and with the internet at their fingertips, no one is immune to their devious plans. And college students are often particularly vulnerable to online scams. After all, we’re at the beginning of our careers, ...

Ledger Flex: Secure self-custody with E Ink touchscreen display

Ledger today launched Ledger Flex, featuring secure E Ink touchscreen displays powered by Ledger’s Secure OS. It’s available to purchase for $249, shipping immediately. The Ledger Flex features a high-resolution, 2.8” display that ...

PKfail: 800+ Major PC Models have Insecure ‘Secure Boot’

Big BIOS bother: Hundreds of PC models from vendors such as HP, Lenovo, Dell, Intel, Acer and Gigabyte shipped with useless boot protection—using private keys that aren’t private. The post PKfail: 800+ Major PC Models have Insecure ‘Secure ...

Randall Munroe’s XKCD ‘President Venn Diagram’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘President Venn Diagram’ appeared first on Security Boulevard.

Your Headaches, Our Solutions: How To Find & Manage Compromised Accounts in Google Workspace/Microsoft 365

Many people are unaware of the amount of work IT leaders in education dedicate to keeping their district’s data safe and secure. That’s why at ManagedMethods, we care about improving your jobs (and reducing your headaches!) One of the most ...

Effortless certificate management with automated CNAME validation

Imperva customers who properly utilize the managed certificate feature can experience a robust,  interruptions-free, and fully automated certificate management process that requires no effort for domain validations and renewals. In today’s ...

Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and more

Essential reading for developers and security professionals alike: a comprehensive comparison of vulnerability databases to help you cut through the noise. The post Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and more appeared ...

USENIX Security ’23 – WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate

Authors/Presenters:Feras Al-Kassar, Luca Compagna, Davide Balzarotti Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

Managing the Rising Tide of CVEs 

The post Managing the Rising Tide of CVEs  appeared first on Digital Defense. The post Managing the Rising Tide of CVEs  appeared first on Security Boulevard.

Suspect Indicted in North Korea Group’s Expansive Spying Operation

North Korea's APT45 threat group is using ransomware attacks on U.S. health care firms to fund an ongoing cyberespionage campaign to steal military and defense secrets that are fed back into the country's banned nuclear weapons program. A North ...

Another API Security Breach: Life360

It’s not always Logical Another day, another API breach in the news. The latest breach occurred on the Life360 platform where an advisory was able to gleam 400k user phone numbers, based on the article written on Bleepingcomputer.com. Known ...

Improvements to Domain Scanner: Streamline Your DMARC Journey

EasyDMARC is all about simplifying your DMARC journey. ... The post Improvements to Domain Scanner: Streamline Your DMARC Journey appeared first on EasyDMARC. The post Improvements to Domain Scanner: Streamline Your DMARC Journey appeared first ...

Happy System Administrator Appreciation Day 2024

You’re making sure your developers can develop, your managers can manage, your customers can … custom? Well, no, but you get the idea. You’re making sure everything runs smoothly. On a good day, nothing breaks and your job isn’t even ...