Application Security News and Articles
Session 6D: Software Security: Vulnerability Detection
Authors, Creators & Presenters: Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University)
PAPER
Too Subtle to Notice: Investigating Executable Stack ...
(If you’d prefer, you can skip the intro blathering and just download the full white paper) Back in 1997, a commercial airline captain noticed his fellow pilots had a problem: they’d gotten so used to following the magenta flight path lines ...
KPMG finds cybersecurity budgets rising sharply as leaders invest in AI-driven defense, resilience, and smarter security operations.
The post Cybersecurity Budgets are Going Up, Pointing to a Boom appeared first on Security Boulevard.
Every cloud service provider that seeks an authorization to operate with the federal government using the FedRAMP framework has to undergo and pass an audit. Beyond passing the audit, the CSP needs to keep and maintain proof of not just their ...
Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft's legitimate OAuth 2.0 device authorization grant flow to trick users into giving them access to their M365 ...
How Do Non-Human Identities Reshape Cybersecurity Trends? Where every digital entity has the potential to be an entry point into an organization’s confidential assets, what role do machine identities, or non-human identities (NHIs), play in ...
How Do Non-Human Identities Enhance Cybersecurity in Cloud Environments? Imagine where machine identities significantly outnumber human identities within corporate networks. This scenario is no longer a prediction but a reality, making the ...
What Are Non-Human Identities (NHIs) in Cybersecurity? How do we ensure the security of machine-to-machine communications? Within cybersecurity, Non-Human Identities (NHIs) are crucial for managing secrets and ensuring comprehensive security. ...
What Are Non-Human Identities, and Why Do They Matter? Have you ever considered the hidden facets of machine identities that silently power our digital infrastructure? Non-Human Identities (NHIs) are increasingly becoming a cornerstone in ...
NCC Group this week revealed it has allied with Qualys to expand the scope of its managed attack surface management (ASM) services to address instances of shadow IT. Amber Mitchell, lead product manager for ASM at NCC Group, said the managed ...
Large enterprises today find themselves stuck in the “messy middle” of digital transformation, managing legacy on-premise firewalls from Palo Alto, Check Point, and Fortinet while simultaneously governing fast-growing cloud ...
Strengthen NIS2 compliance by preventing weak and compromised passwords with Enzoic's continuous credential protection.
The post NIS2 Compliance: Maintaining Credential Security appeared first on Security Boulevard.
Session 6C: Sensor Attacks
Authors, Creators & Presenters: Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong), Kui Wu (University of Victoria), Jinghuai Deng (City University of Hong Kong), Dapeng Wu (City ...
Similar pledges to fight scam networks were made by members of the Association of Southeast Asian Nations in the months leading up to the Bangkok conference.
The post Thailand Conference Launches International Initiative to Fight Online Scams ...
The recent discovery of a cryptomining campaign targeting Amazon compute resources highlights a critical gap in traditional cloud defense. Attackers are bypassing perimeter defenses by leveraging compromised credentials to execute legitimate but ...
Live from AWS re:Invent, Snir Ben Shimol makes the case that vulnerability management is at an inflection point: visibility is no longer the differentiator—remediation is. Organizations have spent two decades getting better at scanning, ...
via the insightful artistry and dry wit of Randall Munroe, creator of XKCD
Permalink
The post Randall Munroe’s XKCD ‘Fifteen Years’ appeared first on Security Boulevard.
Amazon is warning organizations that a North Korean effort to impersonate IT workers is more extensive than many cybersecurity teams may realize after discovering the cloud service provider was also victimized. A North Korean imposter was ...
Google is shutting down its dark web report tool, which was released in 2023 to alert users when their information was found available on the darknet. However, while the report sent alerts, Google said users found it didn't give them next steps ...
StackHawk co-founder and CSO Scott Gerlach has spent most of his career running security teams, and his take on application security is shaped by a simple reality: developers are still too often the last to know when their code ships with risk. ...