Application Security News and Articles


Palo Alto Networks Issues AI Red Alert

SANTA CLARA, Calif. — With great promise comes potential peril. And while artificial intelligence (AI) is looked upon as a panacea for enterprises, it also poses an existential security threat. “We stand at the intersection of human ...

DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller

Authors/Presenters: Timm Lauser, Jannis Hamborg Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

The Ultimate Guide to Data Masking in SQL Server

If you’re exploring data masking in SQL Server, how can you decide which SQL masking method is right for you? Learn all about your options here. The post The Ultimate Guide to Data Masking in SQL Server appeared first on Security Boulevard.

Generating High Quality Test Data for MySQL Through De-identification and Synthesis

As one of the most popular open-source databases, widely used for web applications, MySQL is no stranger to PII and sensitive data. At the same time, its users need production-like data for effective development and testing. Here are the ...

How to Mask Sensitive Data in Files, from CSV to JSON

Tonic’s file connector is a quick and easy way to get de-identified data to power your development. Simply upload data in files (such as CSV) to detect and mask sensitive data, and then generate new output files for safe, fast use. The post How ...

Business Logic Attacks Target Election-Related Sites on Election Day

As U.S. citizens headed to the polls, cyber threat activity against election-related websites was unusually high. One of the most prominent attack types observed this Election Day was business logic attacks—a complex threat that manipulates the ...

Is SOAR Obsolete?

Let’s look at the factors behind the push to declare the end of SOAR, consider their merits, and determine whether or not SOAR is obsolete. The post Is SOAR Obsolete? appeared first on D3 Security. The post Is SOAR Obsolete? appeared first on ...

How to Defend Non-Human Identities from Infostealers

4 min read The identity layer’s most insidious threat is now setting its sights on a different group of targets. Here's how to be ready. The post How to Defend Non-Human Identities from Infostealers appeared first on Aembit. The post How to ...

Blinded by Silence

Blinded by Silence: How Attackers Disable EDR Overview Endpoint Detection and Response systems (EDRs) are an essential part of modern cybersecurity strategies. EDR solutions gather and analyze data from endpoints to identify suspicious ...

Randall Munroe’s XKCD ‘Geometriphylogenetics’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Geometriphylogenetics’ appeared first on Security Boulevard.

Busting Ransomware’s Billion-Dollar Boom with Network Observability and Security

Ransomware-as-a-service (RaaS) is the first example of a specific threat becoming a financially viable business model. The subscription model approach has propelled ransomware to be one of the most pervasive cyber threats of our time, evolving ...

Who’s Afraid of a Toxic Cloud Trilogy?

The Tenable Cloud Risk Report 2024 reveals that nearly four in 10 organizations have workloads that are publicly exposed, contain a critical vulnerability and have excessive permissions. Here’s what to watch for in your organization. In a ...

Black Friday bots are coming—is your e-commerce site prepared?

Black Friday and Cyber Monday bring an influx of both shoppers and bots to your website. Make sure bots don't steal your profits this holiday season with the right preparations. The post Black Friday bots are coming—is your e-commerce site ...

From risks to resilience: Best practices for software supply chain security

As software supply chains evolve in complexity, managing security risks has become an ever-changing challenge. New threats emerge daily, driven by rapid innovation and the heavy reliance on open source components. The post From risks to ...

NIST Clears Backlog of Known Security Flaws but Not All Vulnerabilities

NIST, the embattled agency that analyzes security vulnerabilities, has cleared the backlog of known CVEs that hadn't been processed but needs more time to clear the entire backlog of unanalyzed flaws. The post NIST Clears Backlog of Known ...

ISO/IEC 27001 Certification: Process and Costs

To safeguard your company’s data against hackers, scammers, and other web criminals, you need an effective system. And one of the most foolproof ways is achieving ISO/IEC 27001 certification. The post ISO/IEC 27001 Certification: Process and ...

DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller

Authors/Presenters: Timm Lauser, Jannis Hamborg Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

A Beginner’s Guide to PCI DSS 4.0: Requirements 5-9

Data breaches reached a record high in the US last year, impacting over 350 million individuals. According to one estimate, financial services firms suffered the second highest total of breaches in 2023: 744. It’s not hard to imagine why. In ...

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy

Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, ...

Major cyber attacks and data breaches of 2024

As 2024 draws to a close, the cybersecurity landscape continues to evolve, marked by both familiar adversaries and emerging threats with newer technologies and improved tactics. Rather than merely cataloguing breaches, we look into the anatomy of ...