Application Security News and Articles


Navigating the Cybersecurity Risks of Shadow & Open-Source GenAI

Generative AI is no doubt the leading frontier in AI. Models have captured attention and driven exciting use cases across industries with their ability to create everything from text to images, and even solve complex coding problems. The likes of ...

Cybersecurity Risk Assessment Best Practices | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Cybersecurity Risk Assessment Best Practices | Kovrr appeared first on Security Boulevard.

Bitdefender Scam Copilot detects and combats online scams

Bitdefender launched Scam Copilot, an advanced technology platform powered by AI and designed to detect and fight scams along with fraud attempts across devices including computers, tablets, and mobile phones. The platform has been integrated ...

Attackers deploying red teaming tool for EDR evasion

Threat actors are leveraging the open-source EDRSilencer tool to evade endpoint detection and response systems, Trend Micro researchers have noticed. About EDRSilencer The software, which is intended for red teaming, is being abused to ...

Secuvy unveils features designed to improve data security

Secuvy released several new features designed to enhance data security, mitigate insider threats, and streamline privacy operations. These innovations strengthen Secuvy’s capabilities in compliance, risk management, data leakage prevention, ...

Nametag Deepfake Defense blocks AI-powered impersonation threats

More than 50% of executives expect deepfake attacks to increase over the next 12 months, but only 7% report using new technologies to detect deepfakes. Meanwhile, researchers are repeatedly demonstrating how AI-generated ID documents, selfie ...

Data Zoo ID Fraud & Risk Signals enhances fraud detection

Data Zoo launched its latest service, ID Fraud & Risk Signals. This new solution is designed to enhance customer identification and Know Your Customer (KYC) processes by providing deeper insights into fraud detection and risk assessment, ...

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Uncover lessons from Agile + DevOpsDays Des Moines 2024, featuring talks on DevEx automation, incident response, and building safer, more productive development teams. The post Agile + DevOpsDays Des Moines 2024: Finding A Common Path With ...

Cato DEM helps IT teams overcome network performance problems

Cato Networks expanded the Cato SASE Cloud Platform by introducing Cato Digital Experience Monitoring (DEM). This announcement is the third major expansion to the Cato SASE Cloud Platform in 2024, following the additions of extended detection and ...

Cybersecurity Awareness Month: How CISOs can engage, educate, and empower

Author: Mike Britton, Chief Information Security Officer, Abnormal Security October is upon us, and as we embrace the start of […] The post Cybersecurity Awareness Month: How CISOs can engage, educate, and empower appeared first on Security ...

Nametag Adds Ability to Thwart Deep Fakes to Identity Verification Platform

Nametag today extended its identity verification platform to add an ability to detect and block deep fake attacks created using generative artificial intelligence (AI) technologies. The post Nametag Adds Ability to Thwart Deep Fakes to Identity ...

Sectigo SiteLock 2.0 simplifies website protection for SMBs

Sectigo announced SiteLock 2.0, a major upgrade to SiteLock, its website security and protection platform. SiteLock 2.0 is designed to simplify website protection for small to medium-sized businesses (SMBs). At the core of SiteLock 2.0 is Site ...

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113)

Last week, CISA added CVE-2024-23113 – a critical vulnerability that allows unauthenticated remote code/command execution on unpatched Fortinet FortiGate firewalls – to its Known Exploited Vulnerabilities catalog, thus confirming that ...

More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies

The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah with links to Apollo. The marketing official, a woman ...

Automated vs manual penetration testing – which is best?

Today’s online world is a little like a virtual battlefield, rife with threats and vulnerabilities. So, having a strong cybersecurity posture for your business is crucial. Penetration testing – either automated or manual – is an essential ...

Shielded on All Sides: Combining Manual PII Removal and Vulnerability Monitoring to Enhance Executive Protection

Nisos Shielded on All Sides: Combining Manual PII Removal and Vulnerability Monitoring to Enhance Executive Protection The availability of sensitive personal data through breaches and its continual sale online exposes individuals—and by ...

Ubuntu Fixes Multiple PHP Vulnerabilities: Update Now

Multiple security vulnerabilities were identified in PHP, a widely-used open source general purpose scripting language which could compromise the security and integrity of web applications. These vulnerabilities include incorrect parsing of ...

Calix enhances SmartHome to improve protection for residential subscribers

Calix announced significant updates to Calix SmartHome that will help broadband service providers (BSPs) meet every home internet need with enhanced security and comprehensive offerings. These SmartHome innovations make it easier for BSPs to ...

A Deep Dive into DDoS Carpet-Bombing Attacks

With the rapid growth of the internet, especially in areas like cloud computing, 5G, and IoT technologies, the scale of botnets continues to expand, intensifying the battle between attack and defense. In response, DDoS attacks have evolved, ...

Netwrix appoints Grady Summers as CEO

Netwrix announced that Grady Summers has been appointed CEO effective immediately. Summers succeeds Steve Dickson, who has successfully led the company through record growth during his six-year tenure. Under Dickson’s leadership, Netwrix ...