Application Security News and Articles


The Essential KVM Cheat Sheet for System Administrators

The virsh command is used for managing guest virtual machines.  You can start, stop, reboot, and get information about VMs effortlessly with commands. Automating security patching on KVM virtualization systems is possible with the QEMUCare live ...

Click Fraud: What it is & How it Works

Click fraud happens with the intention of influencing traffic statistics, votes, or rankings—usually at a large scale. Here's how DataDome stops it. The post Click Fraud: What it is & How it Works appeared first on Security Boulevard.

GUEST ESSAY: Here’s why securing smart cities’ critical infrastructure has become a top priority

Critical infrastructure like electrical, emergency, water, transportation and security systems are vital for public safety but can be taken out with a single cyberattack. How can cybersecurity professionals protect their cities? In 2021, a lone ...

The first steps of establishing your cloud security strategy

In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so by discussing the cloud security impact of individual, concrete actions featured within the CIS Critical Security Controls ...

TA547 Phishing Attack: German Companies Hit With Infostealer

Researchers at Proofpoint have found out that the TA547 phishing attack campaigns have been targeting different German companies. Identified as TA547, the threat actor has been using an information stealer called Rhadamanthys to get its hand on ...

Scytale’s Multi-Framework Cross-Mapping: Your Shortcut to a Complete Compliance Program

With Scytale's Multi-Framework Cross-Mapping, companies can implement and manage multiple security frameworks without the headaches. The post Scytale’s Multi-Framework Cross-Mapping: Your Shortcut to a Complete Compliance Program appeared first ...

How to optimize your bug bounty programs

In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role bug bounty programs play in identifying security vulnerabilities and facilitating collaboration with ...

Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity

Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security practitioners cut through the noise and understand console behavior in their environment. ...

Fuxnet malware: Growing threat to industrial sensors

In this Help Net Security video, Sonu Shankar, Chief Strategy Officer at Phosphorus, discusses how Blackjack’s Fuxnet malware should be a wakeup call to industrial operators about the vulnerability of sensor networks and the outsized impact ...

Uncertainty is the most common driver of noncompliance

Most compliance leaders tend to focus on building an ethical culture in their organizations to improve employee behavior, but it has a limited impact on addressing uncertainty about how to be compliant, according to a survey by Gartner. Three ...

10 Essentials Every Anti-Phishing Course Must Have

In August 2023, Russian threat actors targeted several government agencies worldwide with Microsoft Teams phishing attacks. Many of these attacks were successful because unsuspecting users fell for the lures set by the attackers—emails ...

How to improve response to emerging cybersecurity threats

Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos ...

What is HSM Integration?

HSM Integration refers to the process of incorporating a Hardware Security Module (HSM) into an organization’s IT and security infrastructure. HSMs are physical devices designed to secure digital keys and perform cryptographic operations, such ...

Akira Ransomware Group Takes In $42 million from 250 Attacks in a Year

The Akira ransomware has been around for just more than a year, but has caused its share of damage, racking up more than 250 victims and pulling in about $42 million in ransom, according to law enforcement and cybersecurity agencies in the United ...

USENIX Security ’23 – On the Security Risks of Knowledge Graph Reasoning

Authors/Presenters: *Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma and Ting Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the ...

Review: ‘Artificial Intelligence — A Primer for State and Local Governments’

A new book by Alan Shark offers an excellent guide and an AI road map for state and local governments. He answers basic questions that public-sector leaders are asking in 2024.    The post Review: ‘Artificial Intelligence — A Primer for ...

Week in review: Palo Alto firewalls mitigation ineffective, PuTTY client vulnerable to key recovery attack

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation While it initially seemed that protecting Palo Alto Network ...

USENIX Security ’23 – PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information

Authors/Presenters: *Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

What is Mobile Application Security Testing? Explained

Mobile application security testing is a critical aspect of modern software development, driven by the widespread use of mobile devices in our daily lives, which store vast amounts of personal data like photos, email access, social media ...

Baby ASO: A Minimal Viable Transformation for Your SOC

Vaguely relevant but very cyber image from Dall-E One pattern I spotted after looking at the evolution of IT and security organizations over the years, including my time at Gartner is: change is hard, but transformation is harder. Perhaps it is ...