Application Security News and Articles


HiddenLayer Automated Red Teaming prevents malicious manipulation of AI models

HiddenLayer launched Automated Red Teaming solution for artificial intelligence, a transformative tool that enables security teams to rapidly and thoroughly assess generative AI system vulnerabilities. The addition of this new product extends ...

Researchers unearth two previously unknown Linux backdoors

ESET researchers have identified multiple samples of two previously unknown Linux backdoors: WolfsBane and FireWood. The goal of the backdoors and tools discovered is cyberespionage that targets sensitive data such as system information, user ...

Lenovo introduces ThinkShield Firmware Assurance

Lenovo introduced ThinkShield Firmware Assurance as part of its portfolio of enterprise-grade cybersecurity solutions. ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the ...

Owl Cyber Defense Solutions unveils all-in-one PCIe data diode card

Owl Cyber Defense Solutions announced the latest release of Owl Talon, which includes integration with a new all-in-one PCIe data diode card – Owl Talon One. The new data diode card will enable Federal agencies and critical infrastructure ...

Vanta announces new products to enhance GRC and trust programs

Vanta announced a number of new and upcoming products enabling customers to build, demonstrate and enhance their GRC and trust programs. The new offerings include Vanta for Marketplaces to strengthen trust across a company’s entire ecosystem; ...

Deep Instinct delivers malware and ransomware prevention for cloud data stored in S3 buckets

Deep Instinct launched Deep Instinct DSX for Cloud Amazon S3. As organizations increasingly rely on the cloud to power their digital transformation, businesses are generating and storing record amounts of data in the cloud. Cybercriminals know ...

Ukrainian cyberwar experience becomes blueprint for TRYZUB cyber training service

The Computer Emergency Response Team of Ukraine (CERT-UA), part of the State Service of Special Communications and Information Protection (SSSCIP), has joined forces with the simulation training platform Cyber Ranges to unveil TRYZUB, a cyber ...

Actfore TRACE reduces keystrokes and expedites data extraction

Actfore unveiled TRACE (Targeted Retrieval and Automated Content Extraction), an auto-extraction feature to accelerate and improve the accuracy of data mining processes for breach notification list generation. TRACE will be integrated into all ...

Protecting Critical Infrastructure with Zero-Trust and Microsegmentation

Ransomware attacks are increasingly targeting critical infrastructure — essential systems like energy, water, transportation and finance. In 2023 alone, over 40% of attacks hit these sectors, according to the FBI. Meanwhile, agencies like CISA ...

Zitadel raises $9 million to accelerate product development

Zitadel announced its $9 million Series A funding round led by Nexus Venture Partners with participation from Floodgate. Both firms represent the world’s best experts in open source, developer tools, and identity ...

AxoSyslog: Open-source scalable security data processor

AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team. “We first started by making syslog-ng more cloud-ready: we packaged syslog-ng in a container, added helm charts, and ...

10 Best Drata Alternatives to Consider for Compliance Management in 2024

If you’re familiar with platforms like Drata, you may appreciate their streamlined compliance processes and integrations. But if you’re ready for something beyond automation and integration (think powerful AI-driven risk management,  live ...

Product showcase: Augmenting penetration testing with Plainsea

Human-led penetration testing is an essential practice for any organization seeking to proactively address potential attack vectors. However, this indispensable pentesting method is often limited by several factors: high resource demands, project ...

CWE top 25 most dangerous software weaknesses

The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying the root causes of these vulnerabilities provides insights to shape investments, policies, and practices ...

Enhancing visibility for better security in multi-cloud and hybrid environments

In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She discusses the growing complexity of cloud environments and the ...

Preventing credential theft in the age of AI

In this Help Net Security video, Tina Srivastava, MIT Lecturer and CEO of Badge, discusses a 20-year cryptography problem – using biometrics for authentication without storing a face/finger/voice print. This has massive implications for ...

Full recovery from breaches takes longer than expected

In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly. Cybersecurity leaders feel ...

Sentient IAM: Unlocking Success Through Human-Centric Leadership

Discover how servant leadership and a human-centric approach to IAM drive trust, resilience, and impactful results in today’s complex business landscape. The post Sentient IAM: Unlocking Success Through Human-Centric Leadership first appeared ...

Respond to Fewer Alerts with Automated Grouping

Smart SOAR’s automated grouping reduces the noise by filtering out irrelevant alerts, enabling a faster and more efficient response. The post Respond to Fewer Alerts with Automated Grouping appeared first on D3 Security. The post Respond to ...

SOC 2 Compliance Audit: Safeguarding Your Business’s Data

Are you a service organization seeking an audit to gain customers’ trust? Or maybe you are looking to attract prospective clients by proving how serious you are with customers’ data. If that is the case, you have come to the right place. ...