Application Security News and Articles


From risks to resilience: Best practices for software supply chain security

As software supply chains evolve in complexity, managing security risks has become an ever-changing challenge. New threats emerge daily, driven by rapid innovation and the heavy reliance on open source components. The post From risks to ...

NIST Clears Backlog of Known Security Flaws but Not All Vulnerabilities

NIST, the embattled agency that analyzes security vulnerabilities, has cleared the backlog of known CVEs that hadn't been processed but needs more time to clear the entire backlog of unanalyzed flaws. The post NIST Clears Backlog of Known ...

ISO/IEC 27001 Certification: Process and Costs

To safeguard your company’s data against hackers, scammers, and other web criminals, you need an effective system. And one of the most foolproof ways is achieving ISO/IEC 27001 certification. The post ISO/IEC 27001 Certification: Process and ...

DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller

Authors/Presenters: Timm Lauser, Jannis Hamborg Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

A Beginner’s Guide to PCI DSS 4.0: Requirements 5-9

Data breaches reached a record high in the US last year, impacting over 350 million individuals. According to one estimate, financial services firms suffered the second highest total of breaches in 2023: 744. It’s not hard to imagine why. In ...

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy

Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, ...

Major cyber attacks and data breaches of 2024

As 2024 draws to a close, the cybersecurity landscape continues to evolve, marked by both familiar adversaries and emerging threats with newer technologies and improved tactics. Rather than merely cataloguing breaches, we look into the anatomy of ...

NIST is chipping away at NVD backlog

The National Institute of Standards and Technology (NIST) is clearing the backlog of unprocessed CVE-numbered vulnerabilities in the National Vulnerability Database (NVD), but has admitted that their initial estimate of when they would finish the ...

Attestations: A new generation of signatures on PyPI

Read the official announcement on the PyPI blog as well! For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted digital attestations, as specified in PEP 740. These ...

VersaONE unifies security and networking into a single, centrally managed platform

Versa introduced the VersaONE Universal SASE Platform to enhance security and networking capabilities across WAN, LAN, data centers, and cloud. Powered by AI, VersaONE delivers converged SASE, SSE, SD-WAN, and SD-LAN products via a unified ...

Microsoft Power Pages: Data Exposure Reviewed

Learn about a data exposure risk in Microsoft Power Pages due to misconfigured access controls, highlighting the need for better security and monitoring. The post Microsoft Power Pages: Data Exposure Reviewed appeared first on AppOmni. The post ...

To Pay or Not to Pay: The Ransomware Dilemma

Disclaimer: In the majority of cases, the determination of whether or not to pay a ransom is a business decision, […] The post To Pay or Not to Pay: The Ransomware Dilemma appeared first on Security Boulevard.

Google launches on-device AI to alert Android users of scam calls in real-time

Google has announced new security features for Android that provide real-time protection against scams and harmful apps. These features, powered by advanced on-device AI, enhance user safety without compromising privacy. These new security ...

The Elephant in AppSec Conference: 4 Key Takeaways

Here are the key takeaways from the Elephant in AppSec Conference, uncovering the top insights from industry experts in application security. The post The Elephant in AppSec Conference: 4 Key Takeaways appeared first on Security Boulevard.

FBI confirms China-linked cyber espionage involving breached telecom providers

After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the ...

Understanding IP Reputation: Why It Matters for Your Business and How to Improve It

Learn what is IP reputation and what kinds of causes can bring poor reputation. Check out the benefits and improvement ideas for better IP reputation for your business. The post Understanding IP Reputation: Why It Matters for Your Business and ...

The Magic ITAM Formula for Navigating Oracle Java Licensing

IT asset managers have their hands full when they’re trying to strike the best path forward for their companies’ use of Java. Finance leaders at many companies are turning to ITAM professionals and asking them to reduce the cost of Java with ...

How a Windows zero-day was exploited in the wild for months (CVE-2024-43451)

CVE-2024-43451, a Windows zero-day vulnerability for which Microsoft released a fix on November 2024 Patch Tuesday, has been exploited since at least April 2024, ClearSky researchers have revealed. About the vulnerability CVE-2024-43451 affects ...

Red Hat Enterprise Linux 9.5 helps organizations simplify operations

Red Hat announced Red Hat Enterprise Linux 9.5. Red Hat Enterprise Linux helps organizations deploy applications and workloads more quickly and with greater reliability, enabling them to lower costs and more effectively manage workloads across ...

Best 7 Compliance Risk Assessment Tools for 2024

Organizations devote significant resources to their compliance risk assessments each year. Yet many compliance leads and senior executives feel stuck in a cycle of repetition and question whether these efforts yield meaningful benefits.  Do you ...